Assignment:
Discussion:
1. Do a bit of research into File Inclusion Vulnerability.
2. What is it?
3. Why is it dangerous?
4. What is the difference between low and remote inclusion?
5. What methods can be employed to prevent a security breach?
6. What programming languages are vulnerable to this type of attack.
Write about 300 words with in-text citations.