... the STRIDE Model to Determine Threats 17 Lesson: Implementing Security: An Overview 26 Review 38 Module 1: Introduction to Web Security 2 Module 1: Introduction to Web Security ... appropriate authentication and authorization schemes, ensuring data integrity with encryption, and performing data validation. Introduction 4 Module 1: Introduction to Web Security Challenges ... vulnerabilities. ! Enable event logging and auditing in Windows 2000, IIS, and SQL Server and describe the purpose of custom logging. Introduction Module 1: Introduction to Web Security 27 Security...