Management Information Systems, Bowie State University, United States.
E-mail: alaa.adnan1990@hotmail.com.
Over the last twenty years,
the Internet has become highly interactive and is not merely a static repository
of websites, which allows its users to interact proactively. The functions and
tasks of the Internet have evolved during this twenty-year period, such that it
is no longer a rudimentary collection of websites. The Internet empowers
individual users to explore it in an exponentially greater capacity than in
years past. In this study, we will consider the issues of security and trust in
IoT and local cloud interfaces. Additionally, the security, requirements of M2M
services and security solutions for the internet are analyzed, and their
ineffectiveness is discussed.
.
Cite this article as:
Saeed AA
(2022). Managing security risks
in wireless web services. Eng. Technol. Res.
5(1): 001-012.
This is an open access article
published under the terms of the
Creative Commons Attribution
License, which permits unrestricted use, distribution, and
reproduction in any medium, provided the original work is
properly cited.