You have performed a security requirement analysis and determined that part of the solution to the vulnerabilities you have identified will be the implementation of ...