Malicious users try to access companies’ web applications without theirconsent every day. As a result, organizations need to be mindful ofvarious threats to their business. What types of security features areavailable to protect a company from new web application threats? Brieflydiscuss some of the threats and how they may be mitigated.