Assignment 2: Web Application Attack ScenarioSuppose that you are currently employed as an Information Security Manager for a medium-sized software development and outsourcing services company. The So...