1. Discuss on the threat actors and explain in details the four main group of threat actors. 2. Explain in details the seven Software Security Knowledge Catalogs 3. Discuss on the following application security, threat and vulnerability a. Cross-Site Scripting Vulnerability b. SQL Injection Vulnerability c. Broken Authentication and Session Management Vulnerability d. Insecure Direct Object Reference Vulnerability e. Cross-Site Request Forgery (CSRF) Vulnerability .