Processing and Managing Threats Report
Provide a summary report (no less than 200 words per section) on the different ways to threat model. Choose three (3) to talk about:
- Solove’s taxonomy of privacy harms
- The IETF’s “Privacy Considerations for Internet Protocols”
- Privacy Impact Assessments (PIAs)
- The Nymity Slider
- Contextual Integrity
- The LINDDUN approach
For each threat model, provide the model name (note: use the threat model name as a sub-header in bold font), provide the definition along with a brief explanation of the threat model (i.e. what scenario is it used for, the advantage and disadvantage of using it)