.1.What is an SQL injection attack?
Explain how it works and what precautions must be taken to prevent SQL injection attacks. Use one example in your explanation.
2. Explain why, when a manager, say Satoshi, grants an authorization, the grant should be done by the manager role, rather than by the user Satoshi. Use one example in your explanation
3. What is Cross Site Scripting?
Explain, with one example, how it works and what precautions must be taken to prevent such attacks.
Requirements: detailed explanation’s