Use the Internet to research defensesagainst injection attacks.
a) What are the defenses to protect against SQL injectionattacks, XML injection attacks, and XSS?
b) How difficult are they to implement?
c) Why are these defenses not used extensively?