Topics Related to Authentication, Cloud Computing and Threat Monitoring: