which can be implemented to define optimal security architecture for the selected business scenario.