Three Important Approach Strategies for Application Security