Authentication, Authorization and access control, DAC, MAC and RBAC models, Intrusion detection, SQL injection.Read less