Fill in the attached table in Web Security
First: Required 6 Types of incidents occurred from 2016 to 2020
on web security.
The second: choose 5 papers related to web or software security ,read and summarized in the schedule as required Types of incidents
Name of attacks:
Type of attacks:
Dates of incidents:
Target(individual, company, etc)
How it happened
Method of prevention/ approach
References and info links:
PowerPoint, filename or links
Additional Information:
1
Case No :
Name of attacks:
Type of attacks:
Dates of incidents:
Target(individual, company, etc)
How it happened
Method of prevention/ approach
References and info links:
PowerPoint, filename or links
Additional Information:
2
Case No :
Name of attacks:
Type of attacks:
Dates of incidents:
Target(individual, company, etc)
How it happened
Method of prevention/ approach
References and info links:
PowerPoint, filename or links
3
1
Related papers
Paper No :
Title:
Issues/problems
How/why it happened
Objectives:
Proposed approach-method
/techniques/model
Advantages of the method
Disadvantages of the method
Results/findings
What needs to be improved
Conclusion/comments
Additional Information:
1
Paper No :
Title:
Issues/problems
How/why it happened
Objectives:
Proposed approach-method
/techniques/model
Advantages of the method
Disadvantages of the method
Results/findings
What needs to be improved
Conclusion/comments
Additional Information:
2
Paper No :
Title:
Issues/problems
How/why it happened
Objectives:
Proposed approach-method
/techniques/model
Advantages of the method
Disadvantages of the method
Results/findings
What needs to be improved
Conclusion/comments
Additional Information:
3
Paper No :
Title:
Issues/problems
How/why it happened
Objectives:
Proposed approach-method
/techniques/model
Advantages of the method
4
2
Disadvantages of the method
Results/findings
What needs to be improved
Conclusion/comments
Additional Information:
Paper No :
Title:
Issues/problems
How/why it happened
Objectives:
Proposed approach-method
/techniques/model
Advantages of the method
Disadvantages of the method
Results/findings
What needs to be improved
Conclusion/comments
Additional Information:
4
3