SlideShare a Scribd company logo
Much has been made of the new Web 2.0 phenomenon, including social networking sites and
user-created mash-ups. How does Web 2.0 change security for the Internet?
Solution
Ans;
SENSITIVE INFORMATION CAN’T SEND OVER WAP PROTOCOL
Sensitive information should not be sent over the Wireless Application Protocol because
Sensitive information is characterized as information that is protectedfrom unwarranted
disclosure. Access to confidential information ought to be protected. Protection of sensitive
information might be required for legitimate or ethical reasons, for issues relating to individual
privacy, or for proprietary considerations. And the WAP protocol security, data protection
furthermore, respectability are not always provided. There are some safety issues with WAP and
the WTLS protocol. There are some security problems with WAP. The most imperative threat
connected with WAP is the utilization of the WAP gateway. (WHITE, 2010)
There are however too some security weaknesses in the WTLS convention and some conceivable
threats by using mobile devices. And we cannot send sensitive information over WAP because it
usesvery weak encryption algorithm the encryption protocol used to encrypt information during
WAP protocol WTLS session is arranged in the handshake phase. There is apossibility to choose
the 40-bit DES encryption technique. In this strategy, a 5-byte key is utilized which contains five
equality bits. That implies there are just 35 compelling key bits in the DES key. It is anything but
difficult to discover this DES encryption is a very weak encryption algorithm. A 40-bit DES
encryption is a highly frail encryption calculation. WAP does not offer end-to-end security.
(Dave Singel´ee, 2003)
Much has been made of the new Web 2-0 phenomenon- including social net.docx

More Related Content

Similar to Much has been made of the new Web 2-0 phenomenon- including social net.docx

Posting 1 Reply Required What concerns should be underst.docx
Posting 1 Reply Required  What concerns should be underst.docxPosting 1 Reply Required  What concerns should be underst.docx
Posting 1 Reply Required What concerns should be underst.docx
harrisonhoward80223
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
abenimelos
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
SeanHussey8
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf
TouhemiJamel
 
Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2LinkedIn
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Dr. Amarjeet Singh
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
Radhwan Al-Jaki
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
Prateek Panda
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
Ankit Anand
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IJNSA Journal
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IJNSA Journal
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
inside-BigData.com
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
IRJET Journal
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
Symantec
 
Secure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersSecure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and Computers
IRJET Journal
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
IJNSA Journal
 
Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)
IJAEMSJORNAL
 
Device (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptxDevice (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptx
Yousef Al-Mutayeb
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
IJNSA Journal
 

Similar to Much has been made of the new Web 2-0 phenomenon- including social net.docx (20)

Posting 1 Reply Required What concerns should be underst.docx
Posting 1 Reply Required  What concerns should be underst.docxPosting 1 Reply Required  What concerns should be underst.docx
Posting 1 Reply Required What concerns should be underst.docx
 
chapter 7 -wireless network security.ppt
chapter 7  -wireless network security.pptchapter 7  -wireless network security.ppt
chapter 7 -wireless network security.ppt
 
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdfWireless Security – From A to Z – Types, Threats, To How to Secure.pdf
Wireless Security – From A to Z – Types, Threats, To How to Secure.pdf
 
1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf1.3-IoT Security Technologies (1).pdf
1.3-IoT Security Technologies (1).pdf
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2Cisco SAFE_Wireless LAN Security in Depth v2
Cisco SAFE_Wireless LAN Security in Depth v2
 
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
Solving Downgrade and DoS Attack Due to the Four Ways Handshake Vulnerabiliti...
 
Wireless Multimedia
Wireless Multimedia Wireless Multimedia
Wireless Multimedia
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
Cellular wireless network security
Cellular wireless network securityCellular wireless network security
Cellular wireless network security
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FIIMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
 
Viable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be JeopardizedViable means using which Wireless Network Security can be Jeopardized
Viable means using which Wireless Network Security can be Jeopardized
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
 
Secure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and ComputersSecure Channel Communication between IOT Devices and Computers
Secure Channel Communication between IOT Devices and Computers
 
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
A LIGHT WEIGHT SOLUTION FOR DETECTING DE-AUTHENTICATION ATTACK
 
Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)Information Security Technology for IPv6-based IoT (Internet-of-Things)
Information Security Technology for IPv6-based IoT (Internet-of-Things)
 
Device (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptxDevice (Wi-Fi) Security Study HKCERT.pptx
Device (Wi-Fi) Security Study HKCERT.pptx
 
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based NetworksEvaluation of Enhanced Security Solutions in 802.11-Based Networks
Evaluation of Enhanced Security Solutions in 802.11-Based Networks
 

More from maximapikvu8

Wings of birds and wings of insects are---It is a 12 letter word in a.docx
Wings of birds and wings of insects are---It is a 12 letter word in a.docxWings of birds and wings of insects are---It is a 12 letter word in a.docx
Wings of birds and wings of insects are---It is a 12 letter word in a.docx
maximapikvu8
 
Windows provides a very simple mechanism for sharing files among users.docx
Windows provides a very simple mechanism for sharing files among users.docxWindows provides a very simple mechanism for sharing files among users.docx
Windows provides a very simple mechanism for sharing files among users.docx
maximapikvu8
 
Why was Pericles an important figure- in the City of Athens- 2- Clearl.docx
Why was Pericles an important figure- in the City of Athens- 2- Clearl.docxWhy was Pericles an important figure- in the City of Athens- 2- Clearl.docx
Why was Pericles an important figure- in the City of Athens- 2- Clearl.docx
maximapikvu8
 
why is this error showing what have i done wrong Declunilearetant v.docx
why is this error showing what have i done wrong    Declunilearetant v.docxwhy is this error showing what have i done wrong    Declunilearetant v.docx
why is this error showing what have i done wrong Declunilearetant v.docx
maximapikvu8
 
Why is this error showing NewAge2-java-17- error- cannot find symbol n.docx
Why is this error showing NewAge2-java-17- error- cannot find symbol n.docxWhy is this error showing NewAge2-java-17- error- cannot find symbol n.docx
Why is this error showing NewAge2-java-17- error- cannot find symbol n.docx
maximapikvu8
 
Why is it important to reduce disulfide linkages prior to SDS electrop.docx
Why is it important to reduce disulfide linkages prior to SDS electrop.docxWhy is it important to reduce disulfide linkages prior to SDS electrop.docx
Why is it important to reduce disulfide linkages prior to SDS electrop.docx
maximapikvu8
 
Why do statisticians prefer to select samples by a random process- Que.docx
Why do statisticians prefer to select samples by a random process- Que.docxWhy do statisticians prefer to select samples by a random process- Que.docx
Why do statisticians prefer to select samples by a random process- Que.docx
maximapikvu8
 
Why do employers ask for demographic information- (select all that app.docx
Why do employers ask for demographic information- (select all that app.docxWhy do employers ask for demographic information- (select all that app.docx
Why do employers ask for demographic information- (select all that app.docx
maximapikvu8
 
Why can bio-prospecting be controversial- Species are frequently drive.docx
Why can bio-prospecting be controversial- Species are frequently drive.docxWhy can bio-prospecting be controversial- Species are frequently drive.docx
Why can bio-prospecting be controversial- Species are frequently drive.docx
maximapikvu8
 
Why did Malthus's predictions was not realized for most of the develop.docx
Why did Malthus's predictions was not realized for most of the develop.docxWhy did Malthus's predictions was not realized for most of the develop.docx
Why did Malthus's predictions was not realized for most of the develop.docx
maximapikvu8
 
Why are accessory pigments important- A- They are a rich source of ele.docx
Why are accessory pigments important- A- They are a rich source of ele.docxWhy are accessory pigments important- A- They are a rich source of ele.docx
Why are accessory pigments important- A- They are a rich source of ele.docx
maximapikvu8
 
Which xml tag defines global parameters available to all servlets in t.docx
Which xml tag defines global parameters available to all servlets in t.docxWhich xml tag defines global parameters available to all servlets in t.docx
Which xml tag defines global parameters available to all servlets in t.docx
maximapikvu8
 
While using K-means clustering- we scale the variables before we do cl.docx
While using K-means clustering- we scale the variables before we do cl.docxWhile using K-means clustering- we scale the variables before we do cl.docx
While using K-means clustering- we scale the variables before we do cl.docx
maximapikvu8
 
Which statements about chromosomal organization are true and which are.docx
Which statements about chromosomal organization are true and which are.docxWhich statements about chromosomal organization are true and which are.docx
Which statements about chromosomal organization are true and which are.docx
maximapikvu8
 
Which statement below best compares the lithosphere to the crust accor.docx
Which statement below best compares the lithosphere to the crust accor.docxWhich statement below best compares the lithosphere to the crust accor.docx
Which statement below best compares the lithosphere to the crust accor.docx
maximapikvu8
 
Which statement about education as a demographic factor is accurate- M.docx
Which statement about education as a demographic factor is accurate- M.docxWhich statement about education as a demographic factor is accurate- M.docx
Which statement about education as a demographic factor is accurate- M.docx
maximapikvu8
 
Which pairing of microorganism and bioremediation application is NOT c.docx
Which pairing of microorganism and bioremediation application is NOT c.docxWhich pairing of microorganism and bioremediation application is NOT c.docx
Which pairing of microorganism and bioremediation application is NOT c.docx
maximapikvu8
 
Which scenario is most likely to maintain trait variation in a populat.docx
Which scenario is most likely to maintain trait variation in a populat.docxWhich scenario is most likely to maintain trait variation in a populat.docx
Which scenario is most likely to maintain trait variation in a populat.docx
maximapikvu8
 
Which research finding best indicates that a moderator variable was op.docx
Which research finding best indicates that a moderator variable was op.docxWhich research finding best indicates that a moderator variable was op.docx
Which research finding best indicates that a moderator variable was op.docx
maximapikvu8
 
Which organelles originated from the engulfment of ancestral prokaryti.docx
Which organelles originated from the engulfment of ancestral prokaryti.docxWhich organelles originated from the engulfment of ancestral prokaryti.docx
Which organelles originated from the engulfment of ancestral prokaryti.docx
maximapikvu8
 

More from maximapikvu8 (20)

Wings of birds and wings of insects are---It is a 12 letter word in a.docx
Wings of birds and wings of insects are---It is a 12 letter word in a.docxWings of birds and wings of insects are---It is a 12 letter word in a.docx
Wings of birds and wings of insects are---It is a 12 letter word in a.docx
 
Windows provides a very simple mechanism for sharing files among users.docx
Windows provides a very simple mechanism for sharing files among users.docxWindows provides a very simple mechanism for sharing files among users.docx
Windows provides a very simple mechanism for sharing files among users.docx
 
Why was Pericles an important figure- in the City of Athens- 2- Clearl.docx
Why was Pericles an important figure- in the City of Athens- 2- Clearl.docxWhy was Pericles an important figure- in the City of Athens- 2- Clearl.docx
Why was Pericles an important figure- in the City of Athens- 2- Clearl.docx
 
why is this error showing what have i done wrong Declunilearetant v.docx
why is this error showing what have i done wrong    Declunilearetant v.docxwhy is this error showing what have i done wrong    Declunilearetant v.docx
why is this error showing what have i done wrong Declunilearetant v.docx
 
Why is this error showing NewAge2-java-17- error- cannot find symbol n.docx
Why is this error showing NewAge2-java-17- error- cannot find symbol n.docxWhy is this error showing NewAge2-java-17- error- cannot find symbol n.docx
Why is this error showing NewAge2-java-17- error- cannot find symbol n.docx
 
Why is it important to reduce disulfide linkages prior to SDS electrop.docx
Why is it important to reduce disulfide linkages prior to SDS electrop.docxWhy is it important to reduce disulfide linkages prior to SDS electrop.docx
Why is it important to reduce disulfide linkages prior to SDS electrop.docx
 
Why do statisticians prefer to select samples by a random process- Que.docx
Why do statisticians prefer to select samples by a random process- Que.docxWhy do statisticians prefer to select samples by a random process- Que.docx
Why do statisticians prefer to select samples by a random process- Que.docx
 
Why do employers ask for demographic information- (select all that app.docx
Why do employers ask for demographic information- (select all that app.docxWhy do employers ask for demographic information- (select all that app.docx
Why do employers ask for demographic information- (select all that app.docx
 
Why can bio-prospecting be controversial- Species are frequently drive.docx
Why can bio-prospecting be controversial- Species are frequently drive.docxWhy can bio-prospecting be controversial- Species are frequently drive.docx
Why can bio-prospecting be controversial- Species are frequently drive.docx
 
Why did Malthus's predictions was not realized for most of the develop.docx
Why did Malthus's predictions was not realized for most of the develop.docxWhy did Malthus's predictions was not realized for most of the develop.docx
Why did Malthus's predictions was not realized for most of the develop.docx
 
Why are accessory pigments important- A- They are a rich source of ele.docx
Why are accessory pigments important- A- They are a rich source of ele.docxWhy are accessory pigments important- A- They are a rich source of ele.docx
Why are accessory pigments important- A- They are a rich source of ele.docx
 
Which xml tag defines global parameters available to all servlets in t.docx
Which xml tag defines global parameters available to all servlets in t.docxWhich xml tag defines global parameters available to all servlets in t.docx
Which xml tag defines global parameters available to all servlets in t.docx
 
While using K-means clustering- we scale the variables before we do cl.docx
While using K-means clustering- we scale the variables before we do cl.docxWhile using K-means clustering- we scale the variables before we do cl.docx
While using K-means clustering- we scale the variables before we do cl.docx
 
Which statements about chromosomal organization are true and which are.docx
Which statements about chromosomal organization are true and which are.docxWhich statements about chromosomal organization are true and which are.docx
Which statements about chromosomal organization are true and which are.docx
 
Which statement below best compares the lithosphere to the crust accor.docx
Which statement below best compares the lithosphere to the crust accor.docxWhich statement below best compares the lithosphere to the crust accor.docx
Which statement below best compares the lithosphere to the crust accor.docx
 
Which statement about education as a demographic factor is accurate- M.docx
Which statement about education as a demographic factor is accurate- M.docxWhich statement about education as a demographic factor is accurate- M.docx
Which statement about education as a demographic factor is accurate- M.docx
 
Which pairing of microorganism and bioremediation application is NOT c.docx
Which pairing of microorganism and bioremediation application is NOT c.docxWhich pairing of microorganism and bioremediation application is NOT c.docx
Which pairing of microorganism and bioremediation application is NOT c.docx
 
Which scenario is most likely to maintain trait variation in a populat.docx
Which scenario is most likely to maintain trait variation in a populat.docxWhich scenario is most likely to maintain trait variation in a populat.docx
Which scenario is most likely to maintain trait variation in a populat.docx
 
Which research finding best indicates that a moderator variable was op.docx
Which research finding best indicates that a moderator variable was op.docxWhich research finding best indicates that a moderator variable was op.docx
Which research finding best indicates that a moderator variable was op.docx
 
Which organelles originated from the engulfment of ancestral prokaryti.docx
Which organelles originated from the engulfment of ancestral prokaryti.docxWhich organelles originated from the engulfment of ancestral prokaryti.docx
Which organelles originated from the engulfment of ancestral prokaryti.docx
 

Recently uploaded

Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Much has been made of the new Web 2-0 phenomenon- including social net.docx

  • 1. Much has been made of the new Web 2.0 phenomenon, including social networking sites and user-created mash-ups. How does Web 2.0 change security for the Internet? Solution Ans; SENSITIVE INFORMATION CAN’T SEND OVER WAP PROTOCOL Sensitive information should not be sent over the Wireless Application Protocol because Sensitive information is characterized as information that is protectedfrom unwarranted disclosure. Access to confidential information ought to be protected. Protection of sensitive information might be required for legitimate or ethical reasons, for issues relating to individual privacy, or for proprietary considerations. And the WAP protocol security, data protection furthermore, respectability are not always provided. There are some safety issues with WAP and the WTLS protocol. There are some security problems with WAP. The most imperative threat connected with WAP is the utilization of the WAP gateway. (WHITE, 2010) There are however too some security weaknesses in the WTLS convention and some conceivable threats by using mobile devices. And we cannot send sensitive information over WAP because it usesvery weak encryption algorithm the encryption protocol used to encrypt information during WAP protocol WTLS session is arranged in the handshake phase. There is apossibility to choose the 40-bit DES encryption technique. In this strategy, a 5-byte key is utilized which contains five equality bits. That implies there are just 35 compelling key bits in the DES key. It is anything but difficult to discover this DES encryption is a very weak encryption algorithm. A 40-bit DES encryption is a highly frail encryption calculation. WAP does not offer end-to-end security. (Dave Singel´ee, 2003)