1.Web Application Threats and Attacks
Describe and discuss three of the Web Application Threats discussed in the text book. Use the internet to research one the threats find a case that one these attacks was successfully used to attack a system. Give details about the attack. Included reference links.
2.Web Browser Hacking
Discuss and explain how to hack the most common Web browser. Also include methods for securing Web browsers. Include at least two different Web browsers in your discussion.