Building secure KK

  Building secure  Week 2  Learning About OWASP Visit the OWASP website.  Using WORD, transcribe an ORIGINAL trivial essay of 300 expression or past describing the truth and contrast of OWASP.  See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and portray trivially. Safe Assign is software that verifies the originality of your effect resisting on-line sources and other students. Week Five Assignment Learn About creating amiable password warranty. An IT Warranty consultant has made three pristine recommendations respecting passwords: Prohibit guessable passwords such as vulgar names, authentic expression, mass only require particular characters and a mix of caps, inferior contingency and mass in pws Reauthenticate precedently changing passwords user must invade old pw precedently creating new one Make authenticators unforgeable  do not afford email or user ID as password Using WORD, transcribe a trivial tractate of 200-300 expression explaining each of these warranty recommendations. Add added criteria as you see necesarry. Week Thirteen Discussion Research the Dark Web. Write a trivial Discussion on the aftercited topics: What is the Dark Web? How is it accessed? How is it used by criminals? How can it be used in a assured way? How can be used by law enforcement and the report services. How can be used by special people.