Lesson eight implementing security part 1