Name two (2) common means of exploiting end user access (hacking) to web or other on-line systems. For each means of exploiting the system, explain what can be done, if anything, with User Authorization or Authentication, to reduce the likelihood of future occurrences of the exploitation. If you don’t believe either can positively impact the hacking process, explain your position.