Problem 5
Explain, using an analogy drawn from a non-software engineering context, why a layered approach to asset protection should be used.
Problem 6
Explain why it is important to log user actions in the development of secure systems.
Problem 8
Explain why it is important when writing secure systems to validate all user inputs to check that these have the expected format.
Problem 9
Suggest how you would go about validating a password protection system for an application that you have developed. Explain the function of any tools that you think may be useful.