Answered You can hire a professional tutor to get the answer.
Create a 6 pages page paper that discusses secure web development and marketing.
Create a 6 pages page paper that discusses secure web development and marketing. Security is of the utmost importance when building web applications. One would employ a criterion that would first ensure that the passwords used are of sufficient length. They should not contain elements of a weak password such as ordinary dictionary names. The next step the criteria would be to evaluate the encryption technique used. Good encryption is that whose ciphertext cannot be decrypted to obtain the original text or message. One would, therefore, employ SHA-2 as the encryption algorithm.
The network hosting the web application needs to be secure. Thus, the criterion would employ network intrusion devices to identify any weaknesses on the firewalls. One would use firewalls that apply port-based security. Hence, full access to the network is granted only after the user has been authenticated.
The criterion would make use of demilitarized zones (DMZ) in the design of the system hosting the web application. These zones limit the access of attackers to the central servers and prevent cross-site request forgery (CSRF). The criterion will also ensure that the web application uses the secure hypertext protocol (HTTPS). It is important to make proper use of Web API through role-based security to authenticate users, who should disable javascript in their browsers.
The above criteria, if employed, would result in a secure web development process as it uses various software engineering techniques. It shows how these methods can be beneficial in keeping the website secure. For example, the advantage of using a secure password is that it is difficult to hack. The strength of the password increases when special characters are included, and both numbers and keyboard characters used. The disadvantage with this, however, is that strong, lengthy passwords are hard to remember, and they may end up being written down, making them prone to attackers.