I've noticed that many of the people in our study group and I myself still stuggle with information security models. I took some time to create a 20 min deep dive into the models using NotebookLM. Please take some time to listen to it and let me know if this helps.