Real-time Information Assurance 2. Background Security Architecture Approaches