Answer:
b) one needs to follow through all phases, assessment, design, deploy and manage security
Step-by-step explanation:
The security life cycle is a process in which it involves the security artifacts for developing the software through a lifecycle. It contains a detailed plan that derives how to create an application form
At the time when the requirements and activity related to design is finished the next step is the software implementation. In this, the developers begins with the coding as per the requirements and designs discussed in the last step
Therefore according to the given options, the second option is correct