Table 1. Common Web attacks What are the key facts that emerge from the list? At least the following three, I'd say: Whenever you insert any sort of user input into the browser's markup, you potentially expose yourself to a code injection attack (any variations of SQL injection and XSS). Database access must be accomplished securely, that is, using the least set of permissions ever possible for ac