Discussion
Search the Internet for information on securing Web servers and Web browsers.
• Provide all requirements necessary for securing the application software.
• Explain and give proper reasoning for each step to secure the application software.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.