Alternative Assignment 2   Task: Create a protected user account database.using PHP and SQL   Detail:     Create a protected user account database where is security identify a user is allow them to access to the system (Home page), based on the following requirements:   You suppose to implement secure registration form using regular expression and proper validation, login page with username and password-based authenticated using the following mandatory:   Must allow the creation, deletion of user accounts Must provide a demonstration application that grants user access when provide a valid username/password pair The passwords must be protected. No administrator who has access to the underlying file system should be able to see clear text passwords (cryptographic hashing). The password file itself should be protected from tampering Reject any attempts to provide invalid data. Each user account required a validation Password must be protected using cryptography hashing such as md5, sha1, sha2, crypto, based_64. Protect session and cookies

Systems Architecture
7th Edition
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Stephen D. Burd
Chapter3: Data Representation
Section: Chapter Questions
Problem 3RP
icon
Related questions
Question

Alternative Assignment 2

 

Task: Create a protected user account database.using PHP and SQL

 

Detail:  

 

Create a protected user account database where is security identify a user is allow them to access to the system (Home page), based on the following requirements:

 

You suppose to implement secure registration form using regular expression and proper validation, login page with username and password-based authenticated using the following mandatory:

 

Must allow the creation, deletion of user accounts

Must provide a demonstration application that grants user access when provide a valid username/password pair

The passwords must be protected. No administrator who has access to the underlying file system should be able to see clear text passwords (cryptographic hashing).

The password file itself should be protected from tampering

Reject any attempts to provide invalid data.

Each user account required a validation

Password must be protected using cryptography hashing such as md5, sha1, sha2, crypto, based_64.

Protect session and cookies

Prepare report included cover page, screenshot for your code and small description for each screen

Expert Solution
steps

Step by step

Solved in 6 steps

Blurred answer
Knowledge Booster
Intermediate SQL concepts
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning