1. Expand the design of your data security product of Assignment 2D. From your list of possible responses to the threat, choose one that you will focus on in this product. Create the requirements for your product by completely identifying the problem and then completely listing the outputs of your product (what information and/or actions your product produces). A requirements document lists what is needed (required) to solve the problem.
2. Expand the design of your data security product of Assignments Unit 2 D and F. Now that you have specified the problem and listed the required outputs, focus on what the product will do. Create the specifications for your product by completely listing the functionality of the product (ie, list what the product will do) and all the inputs needed for your product to function correctly. Do not focus on how the product will work; that is design.
3. Create the design of your product. Design focuses on issues of algorithms and data structures. Use pseudo-code to specify detailed and unambiguous algorithms for your product