1. Security Technologies
1.1. Cryptographic
1.1.1. Assets of system
1.1.1.1. Vulnerabilities
1.1.1.2. Threats
1.1.1.3. Attacks
1.2. User Authentication
1.2.1. Identification step
1.2.2. verification step
1.2.3. Password - Based Authentication
1.2.3.1. Hashed passwords
1.2.3.2. Password Vulnerabilities
1.2.3.3. Password Cracking
1.2.3.4. Modern Approaches
1.2.3.5. Password File Access Control
1.2.3.6. Password Selection Strategies
1.2.4. Token-Based Authentication
1.2.4.1. Memory Cards
1.2.4.2. Smart toke
1.2.5. Bio metric Authentication
1.2.6. Security issues for user authentication
1.3. Access Control
1.3.1. Discretionary Access Control
1.3.2. Role-based Access Control
1.3.3. Attribute- based access Control
2. Security Management
2.1. Risk management
2.2. Risk Assessment Approaches
2.2.1. Security Risk Assessment
2.2.1.1. Baseline Approach
2.2.1.2. Informal Approach
2.2.1.3. Combined Approach
2.3. security control
2.4. security plan
2.5. security plan implementation
2.6. security compliance
2.7. Change and configuration management
3. Security Domains
3.1. Software Security
3.1.1. Quality and reliability
3.1.2. Handling program input
3.1.3. Validating input syntax
3.1.4. Writing safe program code
3.1.5. Operating system interaction