Manage riskReview findingsResolve findingsPrevent general attacksPrevent general attacksThis section lists some of the general attack methods attackers use to exploit risks in your applications.