Computer Network Security
Please no Plagiarism
Use of diagrams is encouraged.
You can sketch the attack diagrams on a paper with descriptions and take a picture with your camera and submit alongside your typed contents. Diagrams don’t have to be perfect.
1. Describe in details Cross-Site Scripting (XSS) Servers side attack and how programmers and system designers can protect their servers from this type of attack .
2. Describe in details SQL Injection (XSS) Servers side attack and how programmers and system designers can protect their servers from this type of attack.
3. Describe in details Cross-Site Request Forgery attack client side attack and how individuals can protect themselves from becoming victims of this type of attack.