Web Application Vulnerabilities and Attacks
What is the need to secure the web application? What are some of the (potential) vulnerabilities in the web application? Which of the OWASP Top 10 list of web application security risks is the web application vulnerable to and why? For each of the web application security technology products your team identified in section b., explain one critical vulnerability in that product. For each of the web application security mechanisms your team identified in section c., explain one critical vulnerability in that security mechanism. What specific attacks does your web application need to be protected against and why? (Minimum page limit: 4 pages; Maximum page limit: 5 pages). Please include your reference source.
Please use the attached file to provide your response.