Web Application Vulnerabilities

a report on one of the topics related to network/cyber security from the list provided below:

• Web Application Vulnerabilities

• Internet e-Currency (i.e Bitcoins)

• Email spam and phishing

• Social network security and privacy issues

• Cloud computing

• P2P applications (such as BitTorrent, video streaming, etc.)

• Network or application DDoS attacks

• Internet DNS attacks

• Wireless attacks

The report should include the following elements:

• Background

• Business Impact

• Resulting Impact on the Information Technology Field

• Personal Observations and Recommendations

• Conclusion The actual report will be a study of a current event (within the last 5 years)

Sample Solution