The Move To Web 2.0 Increases Security Challenges

As more companies deploy cool Web 2.0 technologies, careful planning is required to avoid new kinds of security problems.

Sharon Gaudin, Contributor

May 24, 2007

3 Min Read

Web 2.0 isn't just for the likes of MySpace and YouTube anymore. Mainstream companies are catching the fever, ramping up their Web sites and creating communities of their customers.

The only problem is, they might be rushing headlong into something that could put their network -- and their customers -- at risk.

"Web 2.0 is all about openness and freedom," said Kris Lamb, a director with IBM's Internet Security Systems, in an interview at Interop. "You're really tearing down the traditional barriers that have kept companies safe. What does security mean for Web 2.0 when you can't make really clear distinctions between 'this is what we allow to happen,' and 'this is what we don't allow.'"

As companies rush to embrace this trendy new media phenomenon, IT and security managers are being warned to slow down the process and make sure they think through their security. How public-facing are these new Web 2.0 features going to be? How much risk are companies willing to take?

"They've got to think about security," said Lamb. "It can't be an afterthought. It has to be part of a larger decision-making process If it's not, there's a lot of risk."

Web 2.0 technologies -- the kinds that promote interactivity and community-building and made MySpace and YouTube household names -- are starting to gain a foothold on more conventional Web sites. Web 2.0 largely is about user-generated content. Corporate executives and marketing heads like the idea of having their customers be participants and sharing information, rather than just getting information off the site. An automobile maker, for instance, might start a social network or blog for customers to write about their experiences with their vehicles or to post pictures or videos from their favorite road trips.

But the advantages of creating these communities and enriched Web sites also come with the same risks that plague the Web 2.0 giants. A worm planted in a MySpace page infected more than 1 million users. Hackers and spammers can join MySpace to create their own pages, riddled with malicious code, to infect their social-networking peers. And hackers are beginning to target vulnerabilities in Ajax applications, which help make the Web 2.0 Web sites so dynamic.

"It's a gold rush right now," said David Cole, director of Symantec Security Response, in an interview at Interop. "But you have to remember that you're taking all this code from the back end and pulling it down to the client side. Before, you could hide it. If you have some goofy code in there, you could be exposing it with these technologies." Paul Judge, chief technology officer at Secure Computing, said in an interview that many companies are still getting their arms around traditional Web site issues, including database validation problems, and now they're being hit with unfamiliar technologies. "These new technologies allow data to move in new ways and at new speeds, and users are so much more involved," he said. "You've got to make sure you're protecting users from each other. You have to have some containment and control."

Symantec 's Cole said IT managers need to make sure they take enough time to plan out the necessary safeguards before they jump into Web 2.0 technologies. If a company is going to use third-party components or widgets, they need to trust the source and audit the software. Make sure that users aren't allowed to use JavaScript, and assume that spammers will find the site -- so set up protections and caution users from putting up too much personally identifying information, especially e-mail addresses.

Cole also recommended that IT automatically and manually scan any user blogs to make sure no one is hiding malicious code in there.

"Don't hold off on going with it," said Judge. "Just be more thoughtful around new security concerns before you roll this out. Curb the excitement to deploy it yesterday. Make sure you give it the same diligence as the rest of the IT system."

About the Author(s)

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights