History and background of OWASP

Building secure
Week 2
Learning About OWASP
Visit the OWASP website.
Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP.
See the Vulnerabilities tab. Choose one of the vulnerabilitieson the linked page and describe briefly.
Safe Assign is software that verifies the originality of your work against on-line sources and other students.
Week Five Assignment
Learn About creating good password security.
An IT Security consultant has made three primary recommendations regarding passwords:

Prohibit guessable passwords

such as common names, real words, numbers only
require special characters and a mix of caps, lower case and numbers in pws

Reauthenticate before changing passwords

user must enter old pwbefore creating new one

Make authenticators unforgeable

do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations. Add additional criteria as you see necesarry.
Week Thirteen Discussion
Research the Dark Web.
Write a brief Discussion on the following topics: What is the Dark Web?How is it accessed?How is it used by criminals?How can itbe used in a positive way? How can be used by law enforcement and the intelligence services. How can be used by private individuals.

Leave a Reply

Your email address will not be published.