A Step-By-Step Guide To Conducting A Comprehensive Cybersecurity Architecture Review