a) List FIVE of the OWASP top ten security issues.
Question
b) Choose ONE of the issues you gave as an answer to part a) and give a detailed description of it.
c) Describe threat modeling and explain why it is one of the most important steps in developing secure web applications.