What are some recent attacks on organizations that resulted in a Database breach?
How would you harden a database to prevent hacking?
How would you harden a webserver from SQL injection?
What types of tools and practices could you utilize?
What forms of authentication can be implemented for a web application?
Describe the authentication techniques and the level of security provided by each.
Describe and discuss the Web Application Threats.
Sample Solution