It is in the ____________________ stage that the actual security functionality and properties are realized in some tangible form.
Fill in the blank(s) with the appropriate word(s).
design
Computer Science & Information Technology
Fill in the blank(s) with the appropriate word(s).
design