Research Paper-Website Hosting and Security
Website Hosting and Security
Determine what your main security consideration for each method would be. Provide a rationale for your response.
Assume that you are an IT Security Professional and you are creating a PowerPoint for your company’s Web application development team that highlights the most common types of attacks a business might face regarding its Website data transmission.
Determine which three (3) attacks you want to include in your presentation and provide a brief description of each. Select the attack you believe to be the most threatening and explain why.