Assess how a good software configuration management program
Assess how a good software configuration management program is critical to your Web application security. Analyze and present the use of discretionary access control (DAC), mandatory access control (MAC), Rules-Based, or Role-Based Access Controls in your response.For Web applications, discuss how the best practices for mitigating vulnerabilities prevent buffer overflow (BO) attacks or SQL Injections (SQI). Give a real-life example of an actual BO or SQI attack, and discuss how it was addressed.