Project Summary: A) Outline and describe The Seven Pernicious Kingdoms (important areas of code) that a secure coding analyst must be aware of. B) Devise a table based on The Seven Pernicious Kingdoms and demonstrate how these 7 areas are mapped to the OWASP top 10.