- Select at least three security models and define them such that nonsecuritys take holders can comprehend the models.
- Explain why the three were chosen.
- Explain how the models are similar.
- Explain how the models are different.
- Provide a recommendation as to which one should be used and why.