Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? Solution Ans; SENSITIVE INFORMATION CAN’T SEND OVER WAP PROTOCOL Sensitive information should not be sent over the Wireless Application Protocol because Sensitive information is characterized as information that is protectedfrom unwarranted disclosure. Access to confidential information ought to be protected. Protection of sensitive information might be required for legitimate or ethical reasons, for issues relating to individual privacy, or for proprietary considerations. And the WAP protocol security, data protection furthermore, respectability are not always provided. There are some safety issues with WAP and the WTLS protocol. There are some security problems with WAP. The most imperative threat connected with WAP is the utilization of the WAP gateway. (WHITE, 2010) There are however too some security weaknesses in the WTLS convention and some conceivable threats by using mobile devices. And we cannot send sensitive information over WAP because it usesvery weak encryption algorithm the encryption protocol used to encrypt information during WAP protocol WTLS session is arranged in the handshake phase. There is apossibility to choose the 40-bit DES encryption technique. In this strategy, a 5-byte key is utilized which contains five equality bits. That implies there are just 35 compelling key bits in the DES key. It is anything but difficult to discover this DES encryption is a very weak encryption algorithm. A 40-bit DES encryption is a highly frail encryption calculation. WAP does not offer end-to-end security. (Dave Singel´ee, 2003) .