SlideShare a Scribd company logo
1 of 2
Much has been made of the new Web 2.0 phenomenon, including social networking sites and
user-created mash-ups. How does Web 2.0 change security for the Internet?
Solution
Ans;
SENSITIVE INFORMATION CAN’T SEND OVER WAP PROTOCOL
Sensitive information should not be sent over the Wireless Application Protocol because
Sensitive information is characterized as information that is protectedfrom unwarranted
disclosure. Access to confidential information ought to be protected. Protection of sensitive
information might be required for legitimate or ethical reasons, for issues relating to individual
privacy, or for proprietary considerations. And the WAP protocol security, data protection
furthermore, respectability are not always provided. There are some safety issues with WAP and
the WTLS protocol. There are some security problems with WAP. The most imperative threat
connected with WAP is the utilization of the WAP gateway. (WHITE, 2010)
There are however too some security weaknesses in the WTLS convention and some conceivable
threats by using mobile devices. And we cannot send sensitive information over WAP because it
usesvery weak encryption algorithm the encryption protocol used to encrypt information during
WAP protocol WTLS session is arranged in the handshake phase. There is apossibility to choose
the 40-bit DES encryption technique. In this strategy, a 5-byte key is utilized which contains five
equality bits. That implies there are just 35 compelling key bits in the DES key. It is anything but
difficult to discover this DES encryption is a very weak encryption algorithm. A 40-bit DES
encryption is a highly frail encryption calculation. WAP does not offer end-to-end security.
(Dave Singel´ee, 2003)
Much has been made of the new Web 2-0 phenomenon- including social net.docx

More Related Content

Similar to Much has been made of the new Web 2-0 phenomenon- including social net.docx

Posting 1 Reply Required What concerns should be underst.docx
Posting 1 Reply Required  What concerns should be underst.docxPosting 1 Reply Required  What concerns should be underst.docx
Posting 1 Reply Required What concerns should be underst.docxharrisonhoward80223
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.pptabenimelos
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfSeanHussey8
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdfTouhemiJamel
 
Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2LinkedIn
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Dr. Amarjeet Singh
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityPrateek Panda
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network securityAnkit Anand
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIJNSA Journal
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IJNSA Journal
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Securityinside-BigData.com
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedIRJET Journal
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsSymantec
 
Secure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersSecure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersIRJET Journal
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK IJNSA Journal
 
Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)IJAEMSJORNAL
 
Device (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptxDevice (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptxYousef Al-Mutayeb
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksIJNSA Journal
 

Similar to Much has been made of the new Web 2-0 phenomenon- including social net.docx (20)

Posting 1 Reply Required What concerns should be underst.docx
Posting 1 Reply Required  What concerns should be underst.docxPosting 1 Reply Required  What concerns should be underst.docx
Posting 1 Reply Required What concerns should be underst.docx
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
 
Secure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersSecure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and Computers
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
 
Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)
 
Device (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptxDevice (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptx
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
 

More from maximapikvu8

Wings of birds and wings of insects are---It is a 12 letter word in a.docx
Wings of birds and wings of insects are---It is a 12 letter word in a.docxWings of birds and wings of insects are---It is a 12 letter word in a.docx
Wings of birds and wings of insects are---It is a 12 letter word in a.docxmaximapikvu8
 
Windows provides a very simple mechanism for sharing files among users.docx
Windows provides a very simple mechanism for sharing files among users.docxWindows provides a very simple mechanism for sharing files among users.docx
Windows provides a very simple mechanism for sharing files among users.docxmaximapikvu8
 
Why was Pericles an important figure- in the City of Athens- 2- Clearl.docx
Why was Pericles an important figure- in the City of Athens- 2- Clearl.docxWhy was Pericles an important figure- in the City of Athens- 2- Clearl.docx
Why was Pericles an important figure- in the City of Athens- 2- Clearl.docxmaximapikvu8
 
why is this error showing what have i done wrong Declunilearetant v.docx
why is this error showing what have i done wrong    Declunilearetant v.docxwhy is this error showing what have i done wrong    Declunilearetant v.docx
why is this error showing what have i done wrong Declunilearetant v.docxmaximapikvu8
 
Why is this error showing NewAge2-java-17- error- cannot find symbol n.docx
Why is this error showing NewAge2-java-17- error- cannot find symbol n.docxWhy is this error showing NewAge2-java-17- error- cannot find symbol n.docx
Why is this error showing NewAge2-java-17- error- cannot find symbol n.docxmaximapikvu8
 
Why is it important to reduce disulfide linkages prior to SDS electrop.docx
Why is it important to reduce disulfide linkages prior to SDS electrop.docxWhy is it important to reduce disulfide linkages prior to SDS electrop.docx
Why is it important to reduce disulfide linkages prior to SDS electrop.docxmaximapikvu8
 
Why do statisticians prefer to select samples by a random process- Que.docx
Why do statisticians prefer to select samples by a random process- Que.docxWhy do statisticians prefer to select samples by a random process- Que.docx
Why do statisticians prefer to select samples by a random process- Que.docxmaximapikvu8
 
Why do employers ask for demographic information- (select all that app.docx
Why do employers ask for demographic information- (select all that app.docxWhy do employers ask for demographic information- (select all that app.docx
Why do employers ask for demographic information- (select all that app.docxmaximapikvu8
 
Why can bio-prospecting be controversial- Species are frequently drive.docx
Why can bio-prospecting be controversial- Species are frequently drive.docxWhy can bio-prospecting be controversial- Species are frequently drive.docx
Why can bio-prospecting be controversial- Species are frequently drive.docxmaximapikvu8
 
Why did Malthus's predictions was not realized for most of the develop.docx
Why did Malthus's predictions was not realized for most of the develop.docxWhy did Malthus's predictions was not realized for most of the develop.docx
Why did Malthus's predictions was not realized for most of the develop.docxmaximapikvu8
 
Why are accessory pigments important- A- They are a rich source of ele.docx
Why are accessory pigments important- A- They are a rich source of ele.docxWhy are accessory pigments important- A- They are a rich source of ele.docx
Why are accessory pigments important- A- They are a rich source of ele.docxmaximapikvu8
 
Which xml tag defines global parameters available to all servlets in t.docx
Which xml tag defines global parameters available to all servlets in t.docxWhich xml tag defines global parameters available to all servlets in t.docx
Which xml tag defines global parameters available to all servlets in t.docxmaximapikvu8
 
While using K-means clustering- we scale the variables before we do cl.docx
While using K-means clustering- we scale the variables before we do cl.docxWhile using K-means clustering- we scale the variables before we do cl.docx
While using K-means clustering- we scale the variables before we do cl.docxmaximapikvu8
 
Which statements about chromosomal organization are true and which are.docx
Which statements about chromosomal organization are true and which are.docxWhich statements about chromosomal organization are true and which are.docx
Which statements about chromosomal organization are true and which are.docxmaximapikvu8
 
Which statement below best compares the lithosphere to the crust accor.docx
Which statement below best compares the lithosphere to the crust accor.docxWhich statement below best compares the lithosphere to the crust accor.docx
Which statement below best compares the lithosphere to the crust accor.docxmaximapikvu8
 
Which statement about education as a demographic factor is accurate- M.docx
Which statement about education as a demographic factor is accurate- M.docxWhich statement about education as a demographic factor is accurate- M.docx
Which statement about education as a demographic factor is accurate- M.docxmaximapikvu8
 
Which pairing of microorganism and bioremediation application is NOT c.docx
Which pairing of microorganism and bioremediation application is NOT c.docxWhich pairing of microorganism and bioremediation application is NOT c.docx
Which pairing of microorganism and bioremediation application is NOT c.docxmaximapikvu8
 
Which scenario is most likely to maintain trait variation in a populat.docx
Which scenario is most likely to maintain trait variation in a populat.docxWhich scenario is most likely to maintain trait variation in a populat.docx
Which scenario is most likely to maintain trait variation in a populat.docxmaximapikvu8
 
Which research finding best indicates that a moderator variable was op.docx
Which research finding best indicates that a moderator variable was op.docxWhich research finding best indicates that a moderator variable was op.docx
Which research finding best indicates that a moderator variable was op.docxmaximapikvu8
 
Which organelles originated from the engulfment of ancestral prokaryti.docx
Which organelles originated from the engulfment of ancestral prokaryti.docxWhich organelles originated from the engulfment of ancestral prokaryti.docx
Which organelles originated from the engulfment of ancestral prokaryti.docxmaximapikvu8
 

More from maximapikvu8 (20)

Wings of birds and wings of insects are---It is a 12 letter word in a.docx
Wings of birds and wings of insects are---It is a 12 letter word in a.docxWings of birds and wings of insects are---It is a 12 letter word in a.docx
Wings of birds and wings of insects are---It is a 12 letter word in a.docx
 
Windows provides a very simple mechanism for sharing files among users.docx
Windows provides a very simple mechanism for sharing files among users.docxWindows provides a very simple mechanism for sharing files among users.docx
Windows provides a very simple mechanism for sharing files among users.docx
 
Why was Pericles an important figure- in the City of Athens- 2- Clearl.docx
Why was Pericles an important figure- in the City of Athens- 2- Clearl.docxWhy was Pericles an important figure- in the City of Athens- 2- Clearl.docx
Why was Pericles an important figure- in the City of Athens- 2- Clearl.docx
 
why is this error showing what have i done wrong Declunilearetant v.docx
why is this error showing what have i done wrong    Declunilearetant v.docxwhy is this error showing what have i done wrong    Declunilearetant v.docx
why is this error showing what have i done wrong Declunilearetant v.docx
 
Why is this error showing NewAge2-java-17- error- cannot find symbol n.docx
Why is this error showing NewAge2-java-17- error- cannot find symbol n.docxWhy is this error showing NewAge2-java-17- error- cannot find symbol n.docx
Why is this error showing NewAge2-java-17- error- cannot find symbol n.docx
 
Why is it important to reduce disulfide linkages prior to SDS electrop.docx
Why is it important to reduce disulfide linkages prior to SDS electrop.docxWhy is it important to reduce disulfide linkages prior to SDS electrop.docx
Why is it important to reduce disulfide linkages prior to SDS electrop.docx
 
Why do statisticians prefer to select samples by a random process- Que.docx
Why do statisticians prefer to select samples by a random process- Que.docxWhy do statisticians prefer to select samples by a random process- Que.docx
Why do statisticians prefer to select samples by a random process- Que.docx
 
Why do employers ask for demographic information- (select all that app.docx
Why do employers ask for demographic information- (select all that app.docxWhy do employers ask for demographic information- (select all that app.docx
Why do employers ask for demographic information- (select all that app.docx
 
Why can bio-prospecting be controversial- Species are frequently drive.docx
Why can bio-prospecting be controversial- Species are frequently drive.docxWhy can bio-prospecting be controversial- Species are frequently drive.docx
Why can bio-prospecting be controversial- Species are frequently drive.docx
 
Why did Malthus's predictions was not realized for most of the develop.docx
Why did Malthus's predictions was not realized for most of the develop.docxWhy did Malthus's predictions was not realized for most of the develop.docx
Why did Malthus's predictions was not realized for most of the develop.docx
 
Why are accessory pigments important- A- They are a rich source of ele.docx
Why are accessory pigments important- A- They are a rich source of ele.docxWhy are accessory pigments important- A- They are a rich source of ele.docx
Why are accessory pigments important- A- They are a rich source of ele.docx
 
Which xml tag defines global parameters available to all servlets in t.docx
Which xml tag defines global parameters available to all servlets in t.docxWhich xml tag defines global parameters available to all servlets in t.docx
Which xml tag defines global parameters available to all servlets in t.docx
 
While using K-means clustering- we scale the variables before we do cl.docx
While using K-means clustering- we scale the variables before we do cl.docxWhile using K-means clustering- we scale the variables before we do cl.docx
While using K-means clustering- we scale the variables before we do cl.docx
 
Which statements about chromosomal organization are true and which are.docx
Which statements about chromosomal organization are true and which are.docxWhich statements about chromosomal organization are true and which are.docx
Which statements about chromosomal organization are true and which are.docx
 
Which statement below best compares the lithosphere to the crust accor.docx
Which statement below best compares the lithosphere to the crust accor.docxWhich statement below best compares the lithosphere to the crust accor.docx
Which statement below best compares the lithosphere to the crust accor.docx
 
Which statement about education as a demographic factor is accurate- M.docx
Which statement about education as a demographic factor is accurate- M.docxWhich statement about education as a demographic factor is accurate- M.docx
Which statement about education as a demographic factor is accurate- M.docx
 
Which pairing of microorganism and bioremediation application is NOT c.docx
Which pairing of microorganism and bioremediation application is NOT c.docxWhich pairing of microorganism and bioremediation application is NOT c.docx
Which pairing of microorganism and bioremediation application is NOT c.docx
 
Which scenario is most likely to maintain trait variation in a populat.docx
Which scenario is most likely to maintain trait variation in a populat.docxWhich scenario is most likely to maintain trait variation in a populat.docx
Which scenario is most likely to maintain trait variation in a populat.docx
 
Which research finding best indicates that a moderator variable was op.docx
Which research finding best indicates that a moderator variable was op.docxWhich research finding best indicates that a moderator variable was op.docx
Which research finding best indicates that a moderator variable was op.docx
 
Which organelles originated from the engulfment of ancestral prokaryti.docx
Which organelles originated from the engulfment of ancestral prokaryti.docxWhich organelles originated from the engulfment of ancestral prokaryti.docx
Which organelles originated from the engulfment of ancestral prokaryti.docx
 

Recently uploaded

ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17Celine George
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaEADTU
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxneillewis46
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxAdelaideRefugio
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxMarlene Maheu
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...EADTU
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMELOISARIVERA8
 

Recently uploaded (20)

ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 

Much has been made of the new Web 2-0 phenomenon- including social net.docx

  • 1. Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? Solution Ans; SENSITIVE INFORMATION CAN’T SEND OVER WAP PROTOCOL Sensitive information should not be sent over the Wireless Application Protocol because Sensitive information is characterized as information that is protectedfrom unwarranted disclosure. Access to confidential information ought to be protected. Protection of sensitive information might be required for legitimate or ethical reasons, for issues relating to individual privacy, or for proprietary considerations. And the WAP protocol security, data protection furthermore, respectability are not always provided. There are some safety issues with WAP and the WTLS protocol. There are some security problems with WAP. The most imperative threat connected with WAP is the utilization of the WAP gateway. (WHITE, 2010) There are however too some security weaknesses in the WTLS convention and some conceivable threats by using mobile devices. And we cannot send sensitive information over WAP because it usesvery weak encryption algorithm the encryption protocol used to encrypt information during WAP protocol WTLS session is arranged in the handshake phase. There is apossibility to choose the 40-bit DES encryption technique. In this strategy, a 5-byte key is utilized which contains five equality bits. That implies there are just 35 compelling key bits in the DES key. It is anything but difficult to discover this DES encryption is a very weak encryption algorithm. A 40-bit DES encryption is a highly frail encryption calculation. WAP does not offer end-to-end security. (Dave Singel´ee, 2003)