The Move To Web 2.0 Increases Security Challenges - InformationWeek
Software // Enterprise Applications
01:30 PM

The Move To Web 2.0 Increases Security Challenges

As more companies deploy cool Web 2.0 technologies, careful planning is required to avoid new kinds of security problems.

Web 2.0 isn't just for the likes of MySpace and YouTube anymore. Mainstream companies are catching the fever, ramping up their Web sites and creating communities of their customers.

The only problem is, they might be rushing headlong into something that could put their network -- and their customers -- at risk.

"Web 2.0 is all about openness and freedom," said Kris Lamb, a director with IBM's Internet Security Systems, in an interview at Interop. "You're really tearing down the traditional barriers that have kept companies safe. What does security mean for Web 2.0 when you can't make really clear distinctions between 'this is what we allow to happen,' and 'this is what we don't allow.'"

As companies rush to embrace this trendy new media phenomenon, IT and security managers are being warned to slow down the process and make sure they think through their security. How public-facing are these new Web 2.0 features going to be? How much risk are companies willing to take?

"They've got to think about security," said Lamb. "It can't be an afterthought. It has to be part of a larger decision-making process If it's not, there's a lot of risk."

Web 2.0 technologies -- the kinds that promote interactivity and community-building and made MySpace and YouTube household names -- are starting to gain a foothold on more conventional Web sites. Web 2.0 largely is about user-generated content. Corporate executives and marketing heads like the idea of having their customers be participants and sharing information, rather than just getting information off the site. An automobile maker, for instance, might start a social network or blog for customers to write about their experiences with their vehicles or to post pictures or videos from their favorite road trips.

But the advantages of creating these communities and enriched Web sites also come with the same risks that plague the Web 2.0 giants. A worm planted in a MySpace page infected more than 1 million users. Hackers and spammers can join MySpace to create their own pages, riddled with malicious code, to infect their social-networking peers. And hackers are beginning to target vulnerabilities in Ajax applications, which help make the Web 2.0 Web sites so dynamic.

"It's a gold rush right now," said David Cole, director of Symantec Security Response, in an interview at Interop. "But you have to remember that you're taking all this code from the back end and pulling it down to the client side. Before, you could hide it. If you have some goofy code in there, you could be exposing it with these technologies."

1 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
[Interop ITX 2017] State Of DevOps Report
[Interop ITX 2017] State Of DevOps Report
The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll