Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Social networking sites are a part of web 2.0

22/11/2021 Client: muhammad11 Deadline: 2 Day

Article 1:

Question: Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?

World Wide Web (www) has advanced as a major technology since its introduction during the 1980s. In beginning web sites were primarily used only by few number of users to share information related to their academic work. As the user interface evolved over the next coming years with each new version bringing in new frameworks and techniques, it powered web as a hub of technology. Web 1.0, 2.0 and 3.0 brought more dynamic features to the users. Web 1.0 used to describe the web content in static resulting in rigid user experience. Web 2.0 which powered social networking sites became popular developing the web which ultimately served as a platform for people to create and share their own content on the web in the form of blogs, wikis, feeds, tagging systems, user-created publication systems etc. The evolution of web technology began to spread its roots into the major business areas which brought in the requirement for high speed and expanded availability for substantial number of users.

On the other hand, Web 2.0 has also brought some security’s concerns. Mainly the component of client interaction with web, it opened doors to unauthorized actions in the application. In order to provide a rich user experience majority Web 2.0 sites have adopted lightweight user interface code such as asynchronous JavaScript and XML (AJAX). In the Conventional client-server models, many of calls (requests) are handled and processed on the server side. AJAX allows a higher percentage of requests to be processed on the client side. This may give malicious users many options to modify any application code running on a client machine by exploring and testing the application for vulnerabilities.

To overcome this objective, developers should consider installing an appliance at the Internet gateway, which performs real-time code inspection of traffic flowing through the corporate network. High performance and high availability appliances capable of monitoring and acting swiftly to block any suspicious web traffic are paramount. Also, it is very important that developers develop the application with security in mind. Following the coding convention, having the code reviewed, testing the application thoroughly are all part of securing the application in the web.

Article 2:

Question: Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?

Web applications, or software as a service (SaaS) Web applications, has certainly revolutionized the way individuals utilize the net. Advancement as advanced and as more people have started to utilize the Internet, the net has experienced through predominant turns specially Web2.0, Web 3.0 and Internet of things. Example customer-facing applications, it has ended up exceptionally troublesome with recently presented security threats. Such applications can effortlessly enter through the conventional security measures taken and enable the programmers to break classified data.

How web 2.0 change securities for internet:

Web 2.0 capabilities serve 2 main purposes 1) to reach the public straightforward manner referred to as social media and 2) to improve the business process. They are progressively utilized by companies for superior staff collaboration and communication. Web 2.0 innovation offers numerous preferences in terms of enhancing the Web and making strides the client involvement, they are too bringing a number of security concerns and assault vectors into presence. Since one characteristic for a web2.0 application is to emerge more noteworthy client association, the presentational the person or client to security threats and vulnerabilities increases.

The following are few security issues of Web 2.0 Environment. They are:

Insufficient Authentication Controls:

In numerous Web 2.0 applications, content is confined within the hands of numerous different clients, not only a select number of affirmed clients. That implies there's a more noticeable possibility that a less-experienced client will roll out an improvement that will adversely influence the general framework.

Cross Site Scripting (XSS):

In a stored cross-site scripting (XSS) vulnerability, malevolent info sent by a hacker is put away in the framework at that point, then showed to different users. Frameworks that enable clients to include arranged substance – like HTML for instance – are particularly defenseless to this assault

Phishing:

In spite of the fact that phishing isn't only a hazard related with Web 2.0 applications using any and all means, the huge number of unique client programming being used makes it harder for users to recognize the honest to goodness and the phony sites. That empowers more viable phishing assaults.

Information Leakage and Integrity:

Data Integrity is one of the key components of information security. In spite of the fact that a hack could prompt loss of respectability, so can unexpected falsehood. An incredible case of this in the general population field is a mixed up alter on Wikipedia which is then acknowledged as truth by a considerable lot of the site's guests. In a business domain, having frameworks open to numerous clients permits a vindictive or mixed up client or clients to post and distribute incorrect data which crushes the respectability of the information.

Despite many security issues, I would use Web2.0 because Web 2.0 is a people-oriented technology. Convenience, social highlights, joint effort, quick stacking applications, intelligence, snappy advancement times and continuous updates are on the whole real patterns. Rather than a million highlights stuffed into one costly programming program, you get littler, sleeker online applications that mean to do only a couple of things extremely well.

Article 3:

Question:

1. Develop a product service idea.

A. Describe the product/service including the benefits of using the product/service

B. Discuss the potential customers for this product/service

2. Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.

While developing a new product its uniqueness should be different from others so that it can survive in the competitive world. Its features must be different and understandable so that it can be preferred by everyone easily. Further these features must provide benefits which can attract more customers by using strategies in marketing. This way we can increase sales and also profits. Based on the benefits only customers prefer your product so they must be easy to use, safe and affordable. Further purpose of the product must be easily understood by consumers. Based on products features we can find potential customers. For example say when painting your building you may chose to paint professionals or laborer to paint. But each one’s work is different to each other. While describing your product to customers, say about its benefits and qualities which will make them interest in the product. For example if the product is about athletic gear focus on durability, comfort and design of the product. We can share the social responsibility by creating the product eco friendly and attract more customers.

Social media sites are better platform for interacting with customers. It also helps in building brand among customers daily. By answering their questions and sharing, will helps in building product image and forms loyal group of customers. It has also drawbacks like problem related to customer service may change violent on facebook and twitter and this causes trolls to harass employee and consumers because of inappropriate posts on website. So organizations have to resolve these conflicts sometimes (Basu, 2017).

Web marketing: this is another strategy for advertising which involves search engine marketing, email marketing, social media marketing, and banner advertising which are done through online. Currently pay per click marketing, SEM is best and evolving quickly in business organizations for advertising.

Consumer Review Networks: with this, consumers can find any product reviews, services and information about brands etc. these reviews will add more value to products in websites. Through this reviews organizations can build up their product value.

Article 4:

Question:

1. Develop a product service idea.

A. Describe the product/service including the benefits of using the product/service

B. Discuss the potential customers for this product/service

2. Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.

This is a service of delivering cargo, especially small-sized goods what do not weigh much by drones. This will require the manufacture of programmed drones, which will use GPS to take route and travel from the point of order to the point of delivery. This will make the process of delivery of small packages fast and efficient, with the recipient receiving his cargo on time. Use of the drones will be more economical as it will save on time and money. No manpower will be required, where the time spent by delivery-persons can be taken, and the individuals find other things to do. Nonetheless, use of drones is a way of improving lifestyle.

Any products will be delivered using drones, especially in urban areas. Therefore, the drones can be used in transferring retail products between sellers and consumers. For instance, vendors of fast foods can be sending lunch boxes to individuals who may have ordered online, right in the places where they are. Therefore, every individual is fit to use the service so long as s/he may wish to transport items without necessarily traveling. The drones will, however, be limited to lifting the weight.

Use of drones in the delivery of cargo is much more economical and environmentally friendly as no burning of fuel is involved and thus, no release of carbon dioxide into the air. The drones use electric energy, which sometimes can be gotten from natural sources such as solar and wind. Among how this service can be marketed electronically include using advertisement though ads on websites, search engines, and phone applications (Gabbai, 2017; Zhang, 2017). The other possible way is through using a tell-a-friend-to-tell-a-friend, initiative after that the service being introduced, the first individuals to use it will recommend their friends using social media such as Facebook, Instagram, among others. The third way is through creating a commercial website and optimizing it using Google search engine, such that upon a customer looking up for such as service, it be popping up atop the list (Gabbai, 2017; Zhang, 2017). One basic disadvantage is that the drones may face obstacles, and they can travel limited ranges of distances. Use of this service will mean joblessness to delivery-person.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Finance Homework Help
Custom Coursework Service
Coursework Help Online
Supreme Essay Writer
Academic Mentor
Math Guru
Writer Writer Name Offer Chat
Finance Homework Help

ONLINE

Finance Homework Help

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$34 Chat With Writer
Custom Coursework Service

ONLINE

Custom Coursework Service

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$17 Chat With Writer
Coursework Help Online

ONLINE

Coursework Help Online

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$35 Chat With Writer
Supreme Essay Writer

ONLINE

Supreme Essay Writer

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$37 Chat With Writer
Academic Mentor

ONLINE

Academic Mentor

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$18 Chat With Writer
Math Guru

ONLINE

Math Guru

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$50 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Unit 3 Assignment: TED Talk Reflection Paper - FINAL PROJECT - What is the subject matter of shirin neshat's rebellious silence - Soap Note CC: “I need to start on birth control, I just don’t know which one to go on as there are so many to choose from.” - Managing a project schedule cpmgt 300 - Fleetnet america accounts payable - Horse grooming kit checklist - Heavy armoured glove crossword clue - Virtual lab the immunology virtual lab - Accurate answers to the questions demonstrating knowledge of statutory interpretation - Leadership Training Webinar - History assignment template - Management Trends - Pilsner urquell dan murphys - 562 glorieta newport beach ca - Usyd sem 2 exam timetable - Nelson mandela long walk to freedom ppt - 10 stages of interpersonal relationships - OPEN DISCUSSION - Esteban 50th anniversary impala guitar - Disaster, Crisis, and Recovery Logistics - Brain imaging studies support the conclusion that meditation _____ - Organ Leader -Discussion 1 - Give me liberty by eric foner 5th edition - Convert contingency table to joint probability - Create a scenario summary report excel 2013 - The weight of glory summary - Discussion question in-cite text - Igcse chemistry experimental techniques questions - NURS-6003N-39/NURS-6003C-39/NRSE-6003C-39-Foundations for Graduate Study - Week 8 - Discussion 9 - Is koi halal certified - respond to 2 colleagues 1 paragraph each for Business - Scope Statement and WBS Excercise - Chay - Main - Dis 6 - 1 - The crucible act 3 questions - 2. how has dna sequencing affected the science of classifying organisms? - NTC/300: Cloud Technologies - CompTIA Cloud+ Certification Discussion - Scheepjes whirl stockists australia - Catholic near death experiences purgatory - Golden leaf foundation board of directors - 6. list three reasons for seeing humanity as the pinnacle of god’s creation. - Water wise products water corp - Analytical essay to kill a mockingbird - Comparitive economics - Two charged spheres are 8.45 cm apart - Chapter7 - Following are selected transactions of danica company for 2016 - Dr selsick insomnia clinic - Compute chavez company's current ratio using the above information - Case Study 1 & 2 - Assignment - Brave new world conformity quotes - Classes of stock outstanding of coca cola - A2 paper length and width - From gene to protein transcription and translation lab answers - Chiharu shiota infinity lines - What is the likely purpose of the passage - Case study on nike brand pdf - Glass container in lab - University of leeds vle - Australian security identification card - Vsan witness appliance compatibility - Pirbright surrey army base - Ezproxy liberty 2048 login - Assignment 11 (use above videos and docs to complete Assignment) - Article critique rubric - Prysmian lv cable catalogue - Applying the roper-logan-tierney model in practice read online - Cooling curve of wax experiment - 42 cliff street yeppoon - Ndis access request form download - Psychology the science of person mind and brain cervone pdf - Tomorrow - Case studiePYSC 430 Module/ - Snap back to reality oh there goes gravity lyrics - Why did miss muffet need a road map 184 answers - Drop factor for micro drip - Physical asset controls in maritime - Elderly Care - Daniel rooke character analysis - Business Ethics Case Study 7 & 8 - Critical Lens Assignment - Ransom book chapter summary - What does consonance mean in a poem - Pick one of Fingarette's main arguments. How convincing do you find it? Make specific reference to at least two different passages from the Analects to support your assessment. - What energy system does a 100m sprinter use - A class divided video questions answers - A company has bonds outstanding with a par value of - Emotional intelligence in social work practice - Na+ and o2 formula - In which of the following cases would you feel weightless - Half value thickness of aluminium - Sustainability poster - Wave on a string simulation answers - Mcdonalds station observation checklist - Crow lake mary lawson themes - Public Health Assignment - The surf shack separation creek