NOTES

1 Tversky and Kahneman, 1973; https://thedecisionlab.com/biases/availability-heuristic/

2 Adapted from NIST SP800-16.

3 https://www.ncsc.gov.uk/files/Business-email-compromise-infographic.pdf

4 https://www.behavioraleconomics.com/resources/mini-encyclopedia-of-be/choice-architecture/

5 https://www.psychologytoday.com/us/basics/cognitive-dissonance

6 In addition, other properties, such as authenticity, accountability, non-repudiation, and reliability can also be involved.

7 Adapted from the definition for information security in ISO/IEC 27000:2009 (ISO/IEC 27032:2012, retrieved using www.iso.org/obp).

8 https://www.lexico.com/definition/cybersecurity

9 Cygenta.

10 ISO/IEC 27032:2012, retrieved using www.iso.org/obp

11 https://www.themantic-education.com/ibpsych/2016/10/24/single-and-double-blind-designs/ ...

Get Cybersecurity ABCs now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.