High Traffic Cyber Security Application Guide