Web Service Security in Social Media Application
Write an essay whose topic is:
;Web service security in social media application
I want write theoretical report in 3 pages
Please i want perfect report for the master students and the
reference style is IEEE
Solution
Introduction
In this modern time, the globe has experienced and witnessed a lot of changes and
development in the communication sector. There have been different and unique types of
communication that have been emerging and making their way into the market, this has made
ways of communication to be cheaper and more competitive. This has led to the development of
social media application. According to [1], explains social media as a group of internet based
applications that are usually developed on the ideology and technological foundation of the web
2.0, the application allows creation and sharing of user generated information. There are many
forms of social media, including, micro blogging, wikis, podcasts, pictures, video, rating and
social bookmarking. Some of the social media services are usually combined or integrated with,
social network aggregation platforms, for example, on Twitter and Facebook which acts as the
provider.
On the other hand, the web service is a software system designed to support and ensure
the efficient and the effective interaction of individual and internet content over a network, in
recent time there have been introduction of new standards and policies to offer security to the
new threats arising while using the social media platform, thus web service have found a new
role to play in a social media application. In this report I will discuss the issue of deploying a
web service security on social media and identify the possible threats that suggest preventive
measures.
Web Service Security in Social Media Application
Web service security is fundamentally changing the security software industry, making
the role of web service more strategic. The web service security in social media emerged out of
a need to protect the user’s content in the social media application [2]. The most critical issue
while using and deploying the web security service is the understanding of the security threat
involved in the social media as well as the best practices for addressing those threats. However,
the decentralized and heterogeneous nature of web services presents challenges in building
system-wide security that could be used in a social media application. Since the social media
application is a powerful application running in the information production environment, it
requires some form authentication and authorization so as the user can access it. The
authentication and authorization enable tracking of the users of a service and they can keep their
data separately from other even if they are using the same platform. Due to this, social media
application requires a comprehensive web service security the context of the framework. Given
that Social media application system comprises web services, security is a fundamental
factor;web service security has to be robust and effective. In addition, the web service security
infrastructure must be flexible enough to support security policies of different users which have a
wide variety of policies.
Security challenges facing social media application and countermeasures
There are several security challenges, threats and countermeasures which are identified;
some of the threats include: Information alteration; in this case an attacker, changes the
authentic data or information from the original source by inserting, removing or modifying the
content, the altered information can be mistaken by the receiver, because the original meaning of
the information is changed. Apart from just altering the information, the attacker can also change
the whole information and create new fake content to deceive the receiver into believing that the
information come from a valid sender or source. Another threat is loss of confidentiality: in this
case, an unauthorized individual can intercept and reads a transmitted message before or after
the message reaches the intended destination[4]. Lastly, the man in the middle attack: in this case
an attacker sits between the real sender and the real receiver and fools both participants. He
tricks them by,for example, capturing and reading all communications from both the sender and
receiver and then send a modified message to each of the involved users[3].
Though the web service security requirements are complex, it does not require any new
inventions in order to implement security there are certain existing approaches that work well for
distributed system security. The internet is one of those things that contributed to the
revolutionary changes in deploying web service security in social media applications. There have
been many changes and different stages of evolution in the web service security field, even with
the use of the internet. There have been different methods and technologies evolving to use the
internet in a better way. Social social media is one of those that have and have been making the
internet to be exciting.
Conclusion
In this report, I have explained the meaning of web service security and also social media
in addition I have given examples of different kind of social media. Furthermore, I have
explained some of development tools for web service security in social media application media.
The web service keeps track of the security changes, thus the user relies on these security
mechanisms as most of their operations occur over the internet.Finally, I explained several
security threats that affect social media application and how they affect the user by tampering
with the original information it becomes crucial for the users to understand the security issues
References
[1] Leonardi, P. M., Huysman, M., &Steinfield, C. (2013). Enterprise social media:
Definition, history, and prospects for the study of social technologies in organizations.
Journal of Computer‐Mediated Communication, 19(1), 1-19.
[2] Lippert, S. K., &Govindarajulu, C. (2015). Technological, organizational, and
environmental antecedents to web services adoption. Communications of the IIMA, 6(1),
14.
[3] Sheng, Q. Z., Qiao, X., Vasilakos, A. V., Szabo, C., Bourne, S., & Xu, X. (2014). Web
services composition: A decade’s overview. Information Sciences, 280, 218-238.
[4] Davies, N., Friday, A., Clinch, S., Sas, C., Langheinrich, M., Ward, G., & Schmidt, A.
(2015). Security and privacy implications of pervasive memory augmentation. Pervasive
Computing, IEEE, 14(1), 44-53.
Order with us today for a quality custom paper on the above topic or any other topic!
What Awaits you:
- High Quality custom-written papers
- Automatic plagiarism check
- On-time delivery guarantee
- Masters and PhD-level writers
- 100% Privacy and Confidentiality