- Confidentiality
- Integrity
- Vulnerability Assessment
- Operations
- Recovery
- Authentication
- Private Data / PII / Information
- Incident Response
- Software Applications
- Data Backups
- Computer Vulnerabilities
- Threats
- Web
- Advanced Persistent Threat (APT)
- Security Incidents
- Response