An Integrated Approach to Security is Vital in the Applicati