To understand where threats come from, and what you can do to harden your web application against the most common attacks and how could that make website more liable. Introduction Analysis of the problem Research methods General structure of the study Academic contribution of the study Literature review and references