D6
While Web 2.0 technologies offer many advantages in terms of enhancing the Internet and improving the user experience, they are also bringing several security concerns and attacks into existence.
In order to provide a rich user experience, many Web 2.0 sites have employed lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the traditional client-server models, most of these requests are handled and processed on the server side. AJAX allows a high proportion of requests to be processed on the client side. This may give malicious users more opportunity to modify any application code running on a client computer when probing and testing an application for vulnerabilities.
The wide adoption of AJAX may also impact the network. The use of AJAX technology can result in frequent or even constant data exchanges between a client and a server, and any excessive delay or data loss during these data transfers may have effects that are visible to the users.
Poor application development and a lack of oversight when integrating security best practices and tools into the System Development Life Cycle (SDLC) are two of the biggest security issues facing Web 2.0 developers. Like all other applications, security considerations must be considered at all phases of the SDLC. Implementation of the proper authentication controls, input validation, error handling controls are essential to avert threats that may result in the unauthorized intrusion.
A secure architecture with appropriate controls is an essential component. A solid session management scheme to ensure that authentication and authorization is performed inside a trusted part of the architecture. Data validation is performed in both directions on the server-side at various layers to limit or prevent injection and other forms of attacks.
Web 2.0 brings new developments to the web and the Internet. However, new security risks also need to be considered. Attackers may shift their focus from the server side to the client side, which is usually considered the weakest link in the security chain. secure software development concepts such as Security through Design, Security through Controls, Security through Openness support protecting applications.
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!
NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post i want a reply post to the below post in 150 words 10 appeared first on Custom Nursing Help.