aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--synopsis.pdfbin79211 -> 80690 bytes
-rw-r--r--synopsis.tex8
2 files changed, 7 insertions, 1 deletions
diff --git a/synopsis.pdf b/synopsis.pdf
index 84b3a76..8ef3e5a 100644
--- a/synopsis.pdf
+++ b/synopsis.pdf
Binary files differ
diff --git a/synopsis.tex b/synopsis.tex
index 080023f..0b50d5a 100644
--- a/synopsis.tex
+++ b/synopsis.tex
@@ -37,7 +37,13 @@ In order to give an answer to it, I will first need to find solutions to the fol
\end{itemize}
\section{Method}
-
+The method which I am going to use in my research consists of a few activities:
+\begin{itemize}
+ \item Getting general information about application security using all of the sources available on the internet, this could include reading articles, watching videos, talks, lectures and and online courses
+ \item Reading books related to the subject of application security
+ \item Finding detailed descriptions and tutorials about specific attack techniques
+ \item Trying to reproduce the attacks by creating vulnerable applications and exploiting them
+\end{itemize}
\section{Plan}
\section{Work}