Topics Related to Authentication, Threat Monitoring and Vulnerability: