Describe application-based threats and security controls