Discussions

Discussions

Discussion 1 :

1. Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? How do secure software development concepts support protecting applications?

Discussion 2 :

Product Idea and Search Engines/Electronic Marketing

1.  Develop a product service idea.

  1. A. Describe the product/service including the benefits of using the product/service
  2. B. Discuss the potential customers for this product/service

2.  Based on the nature of the product/service, recommend at least 3 possible ways to market the product electronically. Your suggestions must include at least one search engine. Describe your recommendations and discuss the advantages and disadvantages of each.

each discussion should be 1 pg long.

I have attached my classmates work for you to get information from
Answer Preview……………

Discussion 1. Web 2.0 refers to the move towards a more collaborative, social, interactive and responsive web. The Web 2.0 served as a marker for changing the philosophy of the web developers. As such, Web 2.0 is an interactive website that enables people to interact and enhance easy access. The incorporation of the Web 2.0 evokes security concerns as the records from varying destinations have been connected to create a consistent experience. The ability for unapproved specialists to gain access to accounts is heightened due to the lack of specialized authorization (Bisong & Rahman, 2011). This is a major concern in that a client can be logged in to a Google application whereby the unapproved specialist can utilize the record data to gain unauthorized access to the client’s Gmail. Primarily, this is attained by acquiring the client’s secret word and log in details. While this issue was settled, its vulnerabilities were highlighted as it emanated from the coordination of varying web administrators. Software organizations should be assessing the security scene to suppress any vulnerabilities. Notably, the organizations can enhance the encryption of secure data to guarantee………………..

APA 649 words
Share this paper
Open Whatsapp chat
1
Hello;
Can we help you?