“eBusiness and Personal Security Vulnerabilities” Please respond to the following:
- Of all the security threats listed in Chapter 3, select the one (1) you believe to be the most commonly perpetrated. Determine which security threat has the potential to cause the most damage. Justify your responses.
- Go to the Open Web Application Security Project (OWASP) Website and review the OWASP top 10 Web Application Security Risks. Next, describe how you would implement a security program corporately to ensure that threats such as the Open Web Application Security Project (OWASP) top 10 are successfully mitigated.