Slide 1 Attacks, Mitigation and fundamental software problems Input Validation, Filtering and Damage Control as Software Mechanisms Slide 2 Attack Examples XSS, XSRF, Buffer…