This assignment is based on the iNTegrity case study presented in Appendix E of our textbook. (The case study starts on page 528.) For this case study, provide answers to Exercise questions #1 through #4 on page 531.
You may find it useful to read Appendix E from the beginning. There is lots of good material there.
The goal of this assignment is to get you to better understand how useful models can be to identify and mitigate threats.
Cognitive science uses an empirical approach to explore behavior and attempts to create models from observation of how people really act and behave. Some of the models found in cognitive sciences are:
“Carl Ellison’s “ceremonies” model of people
A model based on the work of behavioral economist Daniel Kahneman
A model derived from the work of safety expert James Reason
A framework explicitly for reasoning about humans in computer security by CMU professor Laurie Cranor
A model derived from work on humans in security by UCL professor Angela Sasse” (Shostack, 2014, p.297.).
According to your textbook, Chapter 15, p. 297, these models overlap in various ways. List three ways in which these models overlap. Support your answer with the APA citation based on your textbook.
DQ requirement: Note that the requirement is to post your initial response no later than Thursday and you must post one additional post during the week (Sunday). I recommend your initial posting to be between 300-400 words. All initial posts must contain a properly formatted in-text citation and scholarly reference.
IF NEEDED A BOOK WILL BE PROVIDED IN PDF .