Expand the section of your report for verifying the implementation of the security recommendations for this week. Identify what is being tested for each verification activity. This should include testing activities to make sure the security system is working properly. An example of this would be using an intentionally incorrect password to make sure the system does not allow the login.