Yоu аre а cybersecurity аnalyst in a large оrganizatiоn when an unusual alert appears late on a Friday afternoon. The alert flags a series of logins to the internal financial reporting system using the credentials of a mid-level finance manager, but the logins are coming from a device that has never before been associated with that employee’s account. As you begin looking into it: Several team members are already discussing the alert in the incident-response channel. One senior analyst confidently suggests it is “probably just the manager working remotely,” and others begin agreeing without independently reviewing the data. You have been told to provide an initial assessment within 20 minutes, but the available logs are incomplete, and the endpoint telemetry (the automated, remote collection and transmission of data from sensors to a central system for monitoring and analysis) from the device has not yet finished syncing. The financial reporting system is used to finalize weekly reports due by the end of the day. In previous incidents, when security controls slowed access to this system, employees found workarounds (e.g., sharing files offline or delaying updates), which created additional risk and tension with IT. Leadership messages your team saying they need a quick determination because shutting the system down would delay reporting deadlines, but they also want to avoid “another situation where security disrupts the business.” You cannot fully analyze everything in the next 20 minutes. Your goal is to choose the single framework that will best structure your immediate response so you (1) make a defensible recommendation under uncertainty and (2) reduce predictable human/organizational failure modes (e.g., premature consensus, poor triage, or disruptive controls that get bypassed). Choose one approach to guide your next steps: OODA Loop Take-the-Best heuristic Product / Process / Panorama Security Perspective In your response: State which approach you choose. Describe what you would do in the next 10–15 minutes using that approach (step-by-step). Select two of the following biases: (1) Status Quo Bias; (2) Framing Effects; (3) Optimism Bias; (4) Control Bias; (5) Confirmation Bias; (6) Endowment Effect; (7) Present Bias / Time Discounting / Procrastination and explain how your chosen framework helps reduce or manage them in this scenario. For each selected bias: Define the bias in your own words. Identify where it appears in the scenario. Explain how your chosen framework helps counteract it during your response.