7 Data and Application Security Issues. 8 Malicious Code and Application Attacks. 9 Cryptography and Private Key Algorithms. 10 PKI and Cryptographic Applications. 11 Principles of Computer Design. 12 Principles of Security Models. 13 Administrative Management. 14 Auditing and Monitoring. 15 Business Continuity Planning. 16 majority Recovery Planning. 19 Physical Security Requirements.