I've seen these ideas mentioned in Cisco Security Documentation. Yet, I cannot find where the definitions of these terms are clearly defined along with the associated techniques. There is documentation regarding Securing the Management Plan and Contr...