Topics Related to Active Monitoring, Authentication and Vulnerability: