SlideShare a Scribd company logo
Web 2.0 is nothing but the term which in use to describe the
social technologies and impacts the way how people interact
simultaneously from all over the world. These are also used at
the enterprise level to collaborate with the teams like on shore/
off -shore model.
As we all know these emerging technological advances will
bring the agility also on the down side they are the reason for
some new threats. With the advancement and value that these
technologies brings all the organizations also should determine
where and how to embrace those software’s. It requires
successful and careful ongoing efforts to secure the assets like
infra, employees and data.
A well defined security program should be adopted by all the
organizations when they are ready to deploy web 2.0
technologies in their environment. Companies should also
formulate a web 2.0 policy and train their employees on web 2.o
practices and security features. Also companies should adapt
some hard IT policies to allow a safe landing of Web 2.0
technologies at the enterprise level.
Organizations should have a team to make decisions on how to
protect their complete content and also the application data
along with monitoring. This team should have the control to
discover threats that involved in these kind of internet based
application traffic and also to protect the data that might get
from the social media applications.
With all the above mentioned in place content based security is
essential to mitigate the threats when they are detected during
these.IT initiatives like customized browser settings,
installation of anti virus software’s, implementing multi factor
authentications , developing a data loss protection solution
should put in place while adapting these web 2.0 technologies.
References:
1.Jaokan and C. Sharma, “Mobile VoIP – approaching the
tripping point”, 2010, available on
http://www.futuretext.com/downloads/mobile_voip.pdf
2. M. Chui, A. Miller and R. Roberts, “Six ways to make Web
2.0 work”, McKinsey Quarterly, Vol. 1, pp. 2-7, 2009

More Related Content

Similar to Web 2.0 is nothing but the term which in use to describe the social

State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
Gary Sandoval
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Tech Mahindra
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile securityJAYANT RAJURKAR
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Enterprise Insider
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
infra-si
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
SolviosTechnology
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
Shuja Ahmad
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
InfinityGroup5
 
web security
web securityweb security
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of Globalization
Aujas Networks Pvt. Ltd.
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
Icomm Technologies
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
Sujata Raskar
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Mobiloitte
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Nuno Alves
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
Merry D'souza
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Alex Zaltsman
 
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docxIT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
vrickens
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
sreevidyaopenteq
 
The advantages of Cloud Application Control
The advantages of Cloud Application ControlThe advantages of Cloud Application Control
The advantages of Cloud Application Control
Web Werks Data Centers
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 

Similar to Web 2.0 is nothing but the term which in use to describe the social (20)

State ofmobilesecurity
State ofmobilesecurityState ofmobilesecurity
State ofmobilesecurity
 
Mobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security ControlMobile App-Store Enhanced Architecture with Pro-active Security Control
Mobile App-Store Enhanced Architecture with Pro-active Security Control
 
report on Mobile security
report on Mobile securityreport on Mobile security
report on Mobile security
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
Top 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdfTop 6 Web Application Security Best Practices.pdf
Top 6 Web Application Security Best Practices.pdf
 
BYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in PakistanBYOD SCOPE: A Study of Corporate Policies in Pakistan
BYOD SCOPE: A Study of Corporate Policies in Pakistan
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
web security
web securityweb security
web security
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of Globalization
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobileEnabling Mobile Workstyles Whitepaper with Citrix XenMobile
Enabling Mobile Workstyles Whitepaper with Citrix XenMobile
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobileMobilizing Enterprise Data - Strategies to succeed in enterprise mobile
Mobilizing Enterprise Data - Strategies to succeed in enterprise mobile
 
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docxIT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
IT 8003 Cloud ComputingGroup Activity 1 SuperTAX Soft.docx
 
Enterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptxEnterprise Mobility Challenges-OpenTeQ.pptx
Enterprise Mobility Challenges-OpenTeQ.pptx
 
The advantages of Cloud Application Control
The advantages of Cloud Application ControlThe advantages of Cloud Application Control
The advantages of Cloud Application Control
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 

More from nicolleszkyj

Select one of the following topicsVideo teleconferencingVoIP .docx
Select one of the following topicsVideo teleconferencingVoIP .docxSelect one of the following topicsVideo teleconferencingVoIP .docx
Select one of the following topicsVideo teleconferencingVoIP .docx
nicolleszkyj
 
Select an organization with which you are familiar and briefly des.docx
Select an organization with which you are familiar and briefly des.docxSelect an organization with which you are familiar and briefly des.docx
Select an organization with which you are familiar and briefly des.docx
nicolleszkyj
 
Select an organization with which you are familiar.Write a 700.docx
Select an organization with which you are familiar.Write a 700.docxSelect an organization with which you are familiar.Write a 700.docx
Select an organization with which you are familiar.Write a 700.docx
nicolleszkyj
 
Select one of the following forms of Latin American popular media.docx
Select one of the following forms of Latin American popular media.docxSelect one of the following forms of Latin American popular media.docx
Select one of the following forms of Latin American popular media.docx
nicolleszkyj
 
Select one of the following funding organizationsUnited Way of .docx
Select one of the following funding organizationsUnited Way of .docxSelect one of the following funding organizationsUnited Way of .docx
Select one of the following funding organizationsUnited Way of .docx
nicolleszkyj
 
Select an organization you are familiar with.Write a 1,050- to.docx
Select an organization you are familiar with.Write a 1,050- to.docxSelect an organization you are familiar with.Write a 1,050- to.docx
Select an organization you are familiar with.Write a 1,050- to.docx
nicolleszkyj
 
Select an organization.Develop the following information for t.docx
Select an organization.Develop the following information for t.docxSelect an organization.Develop the following information for t.docx
Select an organization.Develop the following information for t.docx
nicolleszkyj
 
Select an organization you are familiar with.Writea 1,050- t.docx
Select an organization you are familiar with.Writea 1,050- t.docxSelect an organization you are familiar with.Writea 1,050- t.docx
Select an organization you are familiar with.Writea 1,050- t.docx
nicolleszkyj
 
Select a U.S. city of your choice. ChicagoWrite a 500-600 .docx
Select a U.S. city of your choice. ChicagoWrite a 500-600 .docxSelect a U.S. city of your choice. ChicagoWrite a 500-600 .docx
Select a U.S. city of your choice. ChicagoWrite a 500-600 .docx
nicolleszkyj
 
Select a scenario in which problem solving strategies are utilized.docx
Select a scenario in which problem solving strategies are utilized.docxSelect a scenario in which problem solving strategies are utilized.docx
Select a scenario in which problem solving strategies are utilized.docx
nicolleszkyj
 
Select a specific time period from this weeks readings colonial .docx
Select a specific time period from this weeks readings colonial .docxSelect a specific time period from this weeks readings colonial .docx
Select a specific time period from this weeks readings colonial .docx
nicolleszkyj
 
Select a representative natural ecosystem in your area or one in w.docx
Select a representative natural ecosystem in your area or one in w.docxSelect a representative natural ecosystem in your area or one in w.docx
Select a representative natural ecosystem in your area or one in w.docx
nicolleszkyj
 
Select a local government within your state to analyze. You may se.docx
Select a local government within your state to analyze. You may se.docxSelect a local government within your state to analyze. You may se.docx
Select a local government within your state to analyze. You may se.docx
nicolleszkyj
 
Select a company with a reputation for ethical business practices..docx
Select a company with a reputation for ethical business practices..docxSelect a company with a reputation for ethical business practices..docx
Select a company with a reputation for ethical business practices..docx
nicolleszkyj
 
Selecting a Topic1. Get a copy of a local or regional newspa.docx
Selecting a Topic1. Get a copy of a local or regional newspa.docxSelecting a Topic1. Get a copy of a local or regional newspa.docx
Selecting a Topic1. Get a copy of a local or regional newspa.docx
nicolleszkyj
 
Select two types of hemichordates and two types of nonvertebrate cho.docx
Select two types of hemichordates and two types of nonvertebrate cho.docxSelect two types of hemichordates and two types of nonvertebrate cho.docx
Select two types of hemichordates and two types of nonvertebrate cho.docx
nicolleszkyj
 
Selecta publicly held company to use as the basis for this assig.docx
Selecta publicly held company to use as the basis for this assig.docxSelecta publicly held company to use as the basis for this assig.docx
Selecta publicly held company to use as the basis for this assig.docx
nicolleszkyj
 
Select two health care service providers.Write a 700- to 1,050.docx
Select two health care service providers.Write a 700- to 1,050.docxSelect two health care service providers.Write a 700- to 1,050.docx
Select two health care service providers.Write a 700- to 1,050.docx
nicolleszkyj
 
Select the Duval County Health Department and analyze the responsibi.docx
Select the Duval County Health Department and analyze the responsibi.docxSelect the Duval County Health Department and analyze the responsibi.docx
Select the Duval County Health Department and analyze the responsibi.docx
nicolleszkyj
 
Select one recent domestic attack, which is the Oklahoma City .docx
Select one recent domestic attack, which is the Oklahoma City .docxSelect one recent domestic attack, which is the Oklahoma City .docx
Select one recent domestic attack, which is the Oklahoma City .docx
nicolleszkyj
 

More from nicolleszkyj (20)

Select one of the following topicsVideo teleconferencingVoIP .docx
Select one of the following topicsVideo teleconferencingVoIP .docxSelect one of the following topicsVideo teleconferencingVoIP .docx
Select one of the following topicsVideo teleconferencingVoIP .docx
 
Select an organization with which you are familiar and briefly des.docx
Select an organization with which you are familiar and briefly des.docxSelect an organization with which you are familiar and briefly des.docx
Select an organization with which you are familiar and briefly des.docx
 
Select an organization with which you are familiar.Write a 700.docx
Select an organization with which you are familiar.Write a 700.docxSelect an organization with which you are familiar.Write a 700.docx
Select an organization with which you are familiar.Write a 700.docx
 
Select one of the following forms of Latin American popular media.docx
Select one of the following forms of Latin American popular media.docxSelect one of the following forms of Latin American popular media.docx
Select one of the following forms of Latin American popular media.docx
 
Select one of the following funding organizationsUnited Way of .docx
Select one of the following funding organizationsUnited Way of .docxSelect one of the following funding organizationsUnited Way of .docx
Select one of the following funding organizationsUnited Way of .docx
 
Select an organization you are familiar with.Write a 1,050- to.docx
Select an organization you are familiar with.Write a 1,050- to.docxSelect an organization you are familiar with.Write a 1,050- to.docx
Select an organization you are familiar with.Write a 1,050- to.docx
 
Select an organization.Develop the following information for t.docx
Select an organization.Develop the following information for t.docxSelect an organization.Develop the following information for t.docx
Select an organization.Develop the following information for t.docx
 
Select an organization you are familiar with.Writea 1,050- t.docx
Select an organization you are familiar with.Writea 1,050- t.docxSelect an organization you are familiar with.Writea 1,050- t.docx
Select an organization you are familiar with.Writea 1,050- t.docx
 
Select a U.S. city of your choice. ChicagoWrite a 500-600 .docx
Select a U.S. city of your choice. ChicagoWrite a 500-600 .docxSelect a U.S. city of your choice. ChicagoWrite a 500-600 .docx
Select a U.S. city of your choice. ChicagoWrite a 500-600 .docx
 
Select a scenario in which problem solving strategies are utilized.docx
Select a scenario in which problem solving strategies are utilized.docxSelect a scenario in which problem solving strategies are utilized.docx
Select a scenario in which problem solving strategies are utilized.docx
 
Select a specific time period from this weeks readings colonial .docx
Select a specific time period from this weeks readings colonial .docxSelect a specific time period from this weeks readings colonial .docx
Select a specific time period from this weeks readings colonial .docx
 
Select a representative natural ecosystem in your area or one in w.docx
Select a representative natural ecosystem in your area or one in w.docxSelect a representative natural ecosystem in your area or one in w.docx
Select a representative natural ecosystem in your area or one in w.docx
 
Select a local government within your state to analyze. You may se.docx
Select a local government within your state to analyze. You may se.docxSelect a local government within your state to analyze. You may se.docx
Select a local government within your state to analyze. You may se.docx
 
Select a company with a reputation for ethical business practices..docx
Select a company with a reputation for ethical business practices..docxSelect a company with a reputation for ethical business practices..docx
Select a company with a reputation for ethical business practices..docx
 
Selecting a Topic1. Get a copy of a local or regional newspa.docx
Selecting a Topic1. Get a copy of a local or regional newspa.docxSelecting a Topic1. Get a copy of a local or regional newspa.docx
Selecting a Topic1. Get a copy of a local or regional newspa.docx
 
Select two types of hemichordates and two types of nonvertebrate cho.docx
Select two types of hemichordates and two types of nonvertebrate cho.docxSelect two types of hemichordates and two types of nonvertebrate cho.docx
Select two types of hemichordates and two types of nonvertebrate cho.docx
 
Selecta publicly held company to use as the basis for this assig.docx
Selecta publicly held company to use as the basis for this assig.docxSelecta publicly held company to use as the basis for this assig.docx
Selecta publicly held company to use as the basis for this assig.docx
 
Select two health care service providers.Write a 700- to 1,050.docx
Select two health care service providers.Write a 700- to 1,050.docxSelect two health care service providers.Write a 700- to 1,050.docx
Select two health care service providers.Write a 700- to 1,050.docx
 
Select the Duval County Health Department and analyze the responsibi.docx
Select the Duval County Health Department and analyze the responsibi.docxSelect the Duval County Health Department and analyze the responsibi.docx
Select the Duval County Health Department and analyze the responsibi.docx
 
Select one recent domestic attack, which is the Oklahoma City .docx
Select one recent domestic attack, which is the Oklahoma City .docxSelect one recent domestic attack, which is the Oklahoma City .docx
Select one recent domestic attack, which is the Oklahoma City .docx
 

Recently uploaded

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

Web 2.0 is nothing but the term which in use to describe the social

  • 1. Web 2.0 is nothing but the term which in use to describe the social technologies and impacts the way how people interact simultaneously from all over the world. These are also used at the enterprise level to collaborate with the teams like on shore/ off -shore model. As we all know these emerging technological advances will bring the agility also on the down side they are the reason for some new threats. With the advancement and value that these technologies brings all the organizations also should determine where and how to embrace those software’s. It requires successful and careful ongoing efforts to secure the assets like infra, employees and data. A well defined security program should be adopted by all the organizations when they are ready to deploy web 2.0 technologies in their environment. Companies should also formulate a web 2.0 policy and train their employees on web 2.o practices and security features. Also companies should adapt some hard IT policies to allow a safe landing of Web 2.0 technologies at the enterprise level. Organizations should have a team to make decisions on how to protect their complete content and also the application data along with monitoring. This team should have the control to discover threats that involved in these kind of internet based application traffic and also to protect the data that might get from the social media applications. With all the above mentioned in place content based security is essential to mitigate the threats when they are detected during these.IT initiatives like customized browser settings, installation of anti virus software’s, implementing multi factor authentications , developing a data loss protection solution should put in place while adapting these web 2.0 technologies.
  • 2. References: 1.Jaokan and C. Sharma, “Mobile VoIP – approaching the tripping point”, 2010, available on http://www.futuretext.com/downloads/mobile_voip.pdf 2. M. Chui, A. Miller and R. Roberts, “Six ways to make Web 2.0 work”, McKinsey Quarterly, Vol. 1, pp. 2-7, 2009