NOTES
1 Tversky and Kahneman, 1973; https://thedecisionlab.com/biases/availability-heuristic/
2 Adapted from NIST SP800-16.
3 https://www.ncsc.gov.uk/files/Business-email-compromise-infographic.pdf
4 https://www.behavioraleconomics.com/resources/mini-encyclopedia-of-be/choice-architecture/
5 https://www.psychologytoday.com/us/basics/cognitive-dissonance
6 In addition, other properties, such as authenticity, accountability, non-repudiation, and reliability can also be involved.
7 Adapted from the definition for information security in ISO/IEC 27000:2009 (ISO/IEC 27032:2012, retrieved using www.iso.org/obp).
8 https://www.lexico.com/definition/cybersecurity
9 Cygenta.
10 ISO/IEC 27032:2012, retrieved using www.iso.org/obp
11 https://www.themantic-education.com/ibpsych/2016/10/24/single-and-double-blind-designs/ ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access