Explain the key inherent dangers of the chosen threats

Discussion: “Web Application Threats”

Please respond to any one the following:

• From the e-Activity, rank what you believe to be the top three greatest security threats (e.g., cookie / session poisoning, platform exploits, etc.), and provide a rationale for your rankings. Explain the key inherent dangers of the chosen threats, and indicate the key reasons why you believe such threats pose more of a risk than other current ones in existence. Justify your answer.

• For each of the three Web application threats ranked in the first part of this discussion, discuss the appropriate countermeasures that security personnel could utilize in order to minimize the damage of such threats. Determine whether or not the countermeasures that you have ranked are reactive or proactive in nature, and suggest the primary ways in which each countermeasure could assist in preventing further damage from the threats in question. Explain whether or not honeypots would assist in protecting and evaluating the three threats selected. Provide a rationale for your response.

• Comment on video in the Instructor Insight area. http://www.youtube.com/watch?v=kJyGZDXCbmA

• Discuss any current event relevant to this course.

find the cost of your paper