Consider the two vulnerabilities: Structured query language (SQL) injection and cross-site scripting. Complete the following: Research these topics,…

Consider the two vulnerabilities: Structured query language (SQL) injection and cross-site scripting. Complete the following:

  • Research these topics, and find 2 examples of breaches for each.
  • Provide a brief explanation for what these vulnerabilities entail.
  • Summarize the breaches in terms of the damage to the businesses and the specifics of the attacks.
  • What could have and should have been done to prevent the breaches?
  • What could have and should have been done to mitigate the resulting damage?