Information Security Standards Trusted Computer System Evaluation Criteria Common Criteria →Cryptology Steganography Least Significant Bit Encoding Forensics Access Control Multilevel Security Mandatory Access Control Discretionary/Mandatory Discretionary Access Control Mandatory Access Control Authentication Sessions Access Tokens JSON Web Token (JWT) PASETO: Platform-Agnostic Security Tokens Biscuit Authorization Trusted Computing →Binary Analysis →Network Security →Web Security Privacy Sanitization