Discussion: "Ensuring Software Security"
Answer the following question
• For Web applications, describe the best practices for mitigating vulnerabilities in order to prevent buffer overflow (BO) attacks or SQL Injections (SQI). Give one real-life example of an actual BO or SQI attack, and explain how it was addressed.
• Imagine that you are responsible for the creation of a security policy for creditcard data that will ensure PCI compliance in an upcoming audit for your company. Outline what your policy would entail. Provide a rationale for the components of your policy.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.