Watch this video on YouTube
During which phase of the system development life cycle (SDLC) are access control and encryption algorithms selected?