Summarize the article, including the researcher’s proposed methodology. Analyse strengths and weaknesses of the methodology.
Select one article from a peer reviewed journal related to any of the web application attacks discussed in class: For the selected article: Cross-Site Request Forgery Summarize the article, including the researcher’s proposed methodology. Analyse strengths and weaknesses of the methodology.