Discussion Post: Database Security
• Do a bit of research into File Inclusion Vulnerability.
• What is it? Why is dangerous? What is the difference between low and remote inclusion?
• What methods can be employed to prevent a security breach?
• What programming languages are vulnerable to this type of attack?
The response should include a reference list. Using one-inch margins, Times New Roman 12 pnt font, double-space and APA style of writing and citations.