ITO America Business Technology Publication
 
              
About ITO America
IT Optimization Solution Centers
CIO Resource Centers
BSM & ITILv3
BI
Customer Centric Enterprise and Customer Experience Management
Data Center Optimization
Data Center Security and Integrity
Enterprise Mobility
Green IT and Energy Efficient Data Centers
SaaS and Cloud Computing
Service Oriented Architecture and BPM
Unified Business Communications
Virtualization and Data Center Automation
WAN Application Delivery
CIO Thought Leadership and Contributions
 Podcasts
Videos
Webinars
Business Technology Analyst Partners and Media Partners
ITO America Testimonials and Previous Clients
ITO America Media Kit
ITO America Information Technology Optimization News
Contact ITO America staff
ITO America IT Industry Events
ROI Analysis

Business Technology Whitepapers and Articles
Business Technology Article
PDF Document Download

Document:

Securing Web 2.0: Are your web applications vulnerable?



You must be a logged in to view this document.

Click here if you've lost or would like to change your password?
Register on ITO America Business Technology website

Register on ITOAmerica.com and gain access to countless articles, podcasts, videos and more, contributed by some of the top minds in business technology!


E-mail:
Password:
Verify Password:
Password must be 7-15 characters in length.
Articles in Business Technology
Excerpt:

When Web 2.0 applications push functionality and code to users, they provide hackers with information that can be used for formulating attacks. Often, old attacks such as cross-site scripting become more dangerous when used against Web 2.0 applications. This white paper defines some of the common technological components of Web 2.0 applications and discusses ways of securing them against exploitation.

Web 2.0 uses the web for delivering information that is often created through community contribution. Wikis and blogs are good examples of these types of applications. The main attribute of a Web 2.0 application is interactivity.

In Web 2.0 applications, data can be exchanged between applications in a variety of methods, including XML, JSON and proprietary structures. Often, this data is transmitted in clear text, making it easy for attackers to collect. The increase in functionality and interactivity has increased the ways in which an application can be attacked successfully. Even old attack methods have gained new strength when attacking Web 2.0 applications.

Until security is part of the complete software development lifecycle, Web 2.0 applications will remain insecure and can increase the potential for harm.


HP Optimize the Business Outcome of SOA
Today, service-oriented architecture (SOA) is a mainstream IT initiative that ranks among the top priorities of CIOs. SOA dramatically improves the