What forms of authentication can be implemented for a web application? Describe
three authentication techniques and the level of security provided by each.
Discuss and explain how to hack the most common Web browser. Also include methods for securing Web browsers. Include at least two different Web browsers in your discussion.