
Practical Cybersecurity Architecture
By :

"For applications, you need to make sure that pieces align correctly and that the application itself is secure. The architecture process is there in part to ensure that developers don't do things that will wind up in the application being successfully attacked; for example, to ensure that logging is enabled, that authentication is in place, that secure session identifiers are in use, and so forth. Failure to do these things can often result in an attack because they weaken the application. The architect, seeing this, can design solutions that ensure the application's original goals are satisfied while at the same time closing these issues."
– John Kallil, Chief Information Security Officer
Nowadays, not many software projects are built using the traditional Waterfall development process. That being said, it is useful as a starting point because it is still sometimes used—notably for special-purpose software...
Change the font size
Change margin width
Change background colour