Quantifying security in an unambiguous way using the Trusted System Evaluation Criteria. "Hacking" a system, developing and implementing countermeasures and threat removal, techniques for Access control, confidentiality, etc. Secure the network, web, enterprise and database, the Cloud and the Semantic Web.