2.5.2.1 Systems and networks security basics
2.5.2.2 Data protection
2.5.2.2.1 Data protection technologies (general)
2.5.2.2.1.1 Cryptography
2.5.2.2.2 Personal data protection
2.5.2.2.2.1 Identification management
2.5.2.2.2.1.1 Electronic signature
2.5.2.2.2.1.1.1 Public Key Infrastructure (PKI)
2.5.2.2.2.1.2 Radio Frequency Identification RFID