SlideShare a Scribd company logo
1 of 49
1. While watching the video I observed Merideth’s automatic
thoughts on herself. Some of the things she discussed herself
were that she was shy, she doesn’t feel like she could tell cool
stories but has told good stories in the past. She sees herself as
invisible. She thinks if she does something embarrassing she
will end up alone. Merideth is very careful about conclusions
about herself.
I believe that Merideth is using labeling and mislabeling,
which involves portraying one’s identity on the basis of
imperfections and mistakes of the past. ( Corey,2018) She is
using the ideas of imperfections and mistakes from past
experiences to form the opinions of herself and her reality of
her future. She feels people will judge her too harshly if she
embarrasses herself. I think multi-column is a good way to
chart the client's feelings about themselves and it also helps
with their conclusions of how they feel about themselves.
2. I think that Cognitive theory is a great way to help the client
determine their realization of their feelings about themselves.
This is a way that the client can express their opinions about
themselves and work with the therapist to develop ways to
handle their insecurities. It does involve primary emotions and
behaviors that can be used in the mental process. It encourages
a hands-on approach and a deeper understanding of their
behaviors.
I personally like a more effective and direct approach. One that
breaks down the issues into simple theories. It helps the client
develop a sense of their surroundings and I feel it has a more
lasting effect on the client.
Corey, G. (2018). Theory and Practice of Counseling and
Psychotherapy. Boston, MA: Cengage Learning.
University of the Cumberlands
School of Computer & Information Sciences
ISOL-536 - Security Architecture & Design
Chapter 2: The Art of Security Assessment
Spring 2020
Dr. Errol Waithe
Chapter 2: The Art of Security Assessment
• 2.1 Why Art and Not Engineering?
• 2.2 Introducing “The Process”
• 2.3 Necessary Ingredients
• 2.4 The Threat Landscape
• 2.4.1 Who Are These Attackers? Why Do They Want to Attack
My System?
• 2.5 How Much Risk to Tolerate?
• 2.6 Getting Started
2.1 Why Art and Not Engineering?
The branch of science and technology concerned with the
design, building, and use of
engines, machines, and structures.
Definition of “engineering”:
• In contrast, a security architect must use her or his
understanding of the
currently active threat agents in order to apply these
appropriately to a
particular system. Whether a particular threat agent will aim at
a
particular system is as much a matter of understanding,
knowledge, and
experience as it is cold hard fact. Applying threat agents and
their
capabilities to any particular system is an essential activity
within the art
of threat modeling. Hence, a security assessment of an
architecture is
an act of craft.
2.2 Introducing “The Process”
• Because we security architects have methodologies, or I
should
say, I have a map in my mind while I assess, I can allow myself
to
run down threads into details without losing the whole of both
the architecture and the methodology.
• Practitioners will express these steps in different ways, and
there
are certainly many different means to express the process, all of
them valid.
• This series of steps assumes that the analyst has sufficient
understanding of system architecture and security architecture
going into the analysis.
2.2 Introducing “The Process” – Cont.
• As you read the following list, please remember that there are
significant prerequisite understandings and knowledge domains
that
contribute to a successful ARA.
• Collect the set of credible attack surfaces.
• Enumerate threats for this type of system and its intended
deployment
• Consider threats’ usual attack methods.
• Consider threats’ usual goals.
• Risk assess each attack surface. Risk rating will help to
prioritize attack.
surfaces and remediation.
• Factor in each existing security control (mitigations).
• Intersect threat’s attack methods against the inputs and
connections.
These are the set of attack surfaces.
• Enumerate inputs and connections
2.2 Introducing “The Process” – Cont.
• An analysis must first uncover all the credible attack vectors
of the
system. This simple statement hides significant detail. At this
point in
this work, it may be sufficient to outline the following
mnemonic,
“ATASM.” Figure 2.1 graphically shows an ATASM flow:
Figure 2.1 Architecture, threats, attack surfaces, and
mitigations.
2.2 Introducing “The Process” – Cont.
• These four steps are sketched in the Picture 2.1 – If we break
these down
into their constituent parts, we might have a list something like
the
following, more detailed list:
• Diagram (and understand) the logical architecture of the
system.
• List all the possible threat agents for this type of system.
• List the goals of each of these threat agents.
• List the typical attack methods of the threat agents.
• List the technical objectives of threat agents applying their
attack methods.
• Decompose (factor) the architecture to a level that exposes
every possible attack
surface.
• Apply attack methods for expected goals to the attack
surfaces.
2.3 Necessary Ingredients
• Just as a good cook pulls out all the ingredients from the
cupboards and arranges
them for ready access, so the experienced assessor has at her
fingertips information
that must feed into the assessment.
Figure 2.2 Knowledge sets that feed a security analysis.
Figure 2.3 Strategy knowledge, structure information, and
system specifi cs.
2.3 Necessary Ingredients – Cont.
• Figure 2.3 places each contributing knowledge domain within
the area for which it is
most useful. If it helps you to remember, these are the “3 S’s.”
Strategy, infrastructure
and security structures, and specifications about the system help
determine what is
important: “Strategy, Structures, Specification.”
Figure 2.3 Strategy knowledge, structure information, and
system specifics.
2.4 The Threat Landscape
• Differing groups target and attack different types of systems
in different
ways for different reasons. Each unique type of attacker is
called a
“threat agent.” The threat agent is simply an individual,
organization, or
group that is capable and motivated to promulgate an attack of
one sort
or another.
• Threat agents are not created equal.
• They have different goals.
• They have different methods.
• They have different capabilities and access.
• They have different risk profiles and will go to quite different
lengths to be
successful.
2.4 The Threat Landscape – Cont.
• There are three key attributes of human attackers, as follows:
• Intelligence
• Adaptivity
• Creativity
This means that whatever security is put into place can and will
be
probed, tested, and reverse engineered.
2.4.1 Who Are These Attackers? Why Do They
Want to Attack My System?
• Cyber crime can be an organized criminal’s “dream come
true.” Attacks
can be largely anonymous. Plenty of attack scenarios are
invisible to the
target until after success: Bank accounts can be drained in
seconds.
There’s typically no need for heavy handed thuggery, no guns,
no
physical interaction whatsoever. These activities can be
conducted with
far less risk than physical violence. “Clean crime?”
2.4.1 Who Are These Attackers? Why Do They
Want to Attack My System? – Cont.
• There are documented cases of criminals carefully targeting a
particular
organization. But even in this case, the attacks have gone after
the weak links
of the system, such as poorly constructed user passwords and
unpatched
systems with well-known vulnerabilities, rather than highly
sophisticated
attack scenarios making use of unknown vulnerabilities.
• Further, there’s little incentive to carefully map out a
particular person’s digital
life. That’s too much trouble when there are so many
(unfortunately) who
don’t patch their systems and who use the same, easily guessed
password for
many systems. It’s a simple matter of time and effort. When not
successful,
move on to the next mark.
2.4.1 Who Are These Attackers? Why Do They
Want to Attack My System? – Cont.
• Sometimes a single set of data is targeted, and sometimes the
attacks
seem to be after whatever may be available. Multiple
diversionary
attacks may be exercised to hide the data theft. Note the level of
sophistication here:
• Carefully planned and coordinated
• Highly secretive
• Combination of techniques (sometimes highly sophisticated)
2.4.1 Who Are These Attackers? Why Do They
Want to Attack My System? – Cont.
• Figure 2.4 attempts to provide a visual mapping of the
relationships
between various attributes that we might associate with threat
agents.
This figure includes inanimate threats, with which we are not
concerned
here. Attributes include capabilities, activity level, risk
tolerance,
strength of the motivation, and reward goals.
• Next slide - Figure 2.4 Threat agent attribute relationships.
Chapter 2: Summary
Information assurance is achieved when information and
information systems are
protected against attacks through the application of security
services such as availability,
integrity, authentication, confidentiality, and nonrepudiation.
The application of these services
should be based on the protect, detect, and react paradigm.
• This means that in addition to incorporating protection
mechanisms,
organizations need to expect attacks and include attack
detection
tools and procedures that allow them to react to and recover
from
these unexpected attacks.
University of the Cumberlands�School of Computer &
Information Sciences��Chapter 2: The Art of Security
Assessment 2.1 Why Art and Not Engineering? 2.2 Introducing
“The Process”2.2 Introducing “The Process” – Cont. 2.2
Introducing “The Process” – Cont. 2.2 Introducing “The
Process” – Cont. 2.3 Necessary Ingredients2.3 Necessary
Ingredients – Cont. 2.4 The Threat Landscape2.4 The Threat
Landscape – Cont. 2.4.1 Who Are These Attackers? Why Do
They Want to Attack My System?2.4.1 Who Are These
Attackers? Why Do They Want to Attack My System? – Cont.
2.4.1 Who Are These Attackers? Why Do They Want to Attack
My System? – Cont. 2.4.1 Who Are These Attackers? Why Do
They Want to Attack My System? – Cont. Slide Number
16Chapter 2: Summary
University of the Cumberlands
School of Computer & Information Sciences
ISOL-536 - Security Architecture & Design
Chapter 1: Introduction
Spring 2020
Dr. Errol Waithe
Welcome
• Chapter 1: Introduction
• 1.1 Breach! Fix It!
• 1.2 Information Security, as Applied to Systems
• 1.3 Applying Security to Any System
Chapter 1: Introduction
• 1.1 Breach! Fix It!
• Advances in information security have been repeatedly driven
by spectacular
attacks and by the evolutionary advances of the attackers.
• The password file for millions of customers was stolen
through the front end
of a web site pulling in 90% of a multi-billion dollar revenue
stream.
• The chance of an attempted attack of one kind or another is
certain. The
probability of a web attack is 100%; systems are being attacked
and will be
attacked regularly and continually.
• Indeed, system complexity leads to increasing the difficulty of
defense and,
inversely, decreasing the difficulty of successful exploitation.
The number of
flows between systems can turn into what architects call,
“spaghetti,” a
seeming lack of order and regularity in the design.
Chapter 1: Introduction – Cont.
• If a breach or significant compromise and loss creates an
opportunity, then
that opportunity quite often is to build a security architecture
practice. A
major part or focus of that maturing security architecture
practice will be the
assessment of systems for the purpose of assuring that when
deployed, the
assessed systems contain appropriate security qualities and
controls.
• Sensitive data will be protected in storage, transmission, and
processing.
• Sensitive access will be controlled (need-to-know,
authentication, and
authorization).
• Defenses will be appropriately redundant and layered to
account for failure.
• There will be no single point of failure in the controls.
• Systems are maintained in such a way that they remain
available for use.
• Activity will be monitored for attack patterns and failures.
Chapter 1: Introduction – Cont.
• 1.2 Information Security, as Applied to Systems
• Security architecture applies the principles of security to
system
architectures.
• Without security architecture, the intrusion system (IDS)
might be distinct and
independent from the firewalls (perimeter). Firewalls and IDS
would then be
unconnected and independent from anti-virus and anti-malware
on the
endpoint systems and entirely independent of server protections.
• The security architect first uncovers the intentions and
security needs of the
organization: open and trusting or tightly controlled, the data
sensitivities,
and so forth.
Chapter 1: Introduction – Cont.
• When standards do not match what can actually be achieved,
the standards
become empty ideals. In such a case, engineers’ confidence will
be shaken;
system project teams are quite likely to ignore standards, or
make up their
own. Security personnel will lose considerable influence.
Therefore, as we
shall see, it’s important that standards match capabilities
closely, even when
the capabilities are limited. In this way, all participants in the
system security
process will have more confidence in analysis and requirements.
Chapter 1: Introduction – Cont.
• Decision makers need to understand precisely what protections
can be put
into place and have a good understanding of any residual,
unprotected risks
that remain.
• A suite of controls implemented for a system becomes that
system’s defense.
If well designed, these become a “defense-in-depth,” a set of
overlapping and
somewhat redundant controls. Because, of course, things fail.
One security
“principle” is that no single control can be counted upon to be
inviolable.
Everything may fail. Single points of failure are potentially
vulnerable.
Chapter 1: Introduction – Cont.
• The Open Web Application Security Project (OWASP)
provides a distillation of
several of the most well known sets of computer security
principles:
• Apply defense-in-depth (complete mediation).
• Use a positive security model (fail-safe defaults, minimize
attack surface).
• Fail securely.
• Run with least privilege.
• Avoid security by obscurity (open design).
• Keep security simple (verifiable, economy of mechanism).
• Detect intrusions (compromise recording).
• Don’t trust infrastructure.
• Establish secure defaults.
Chapter 1: Introduction – Cont.
• 1.3 Applying Security to Any System
• A typical progression of security maturity is to start by
building one-off security
features into systems during system implementation. During the
early periods, there
may be only one critical system that has any security
requirements! It will be easier
and cheaper to simply build the required security services as a
part of the system as
it’s being implemented. As time goes on, perhaps as business
expands into new
territories or different products, there will be a need for
common architectures, if for
no other reason than maintainability and shared cost. It is
typically at this point that a
security infrastructure comes into being that supports at least
some of the common
security needs for many systems to consume. It is
characteristically a virtue to keep
complexity to a minimum and to reap scales of economy.
Chapter 1: Introduction – Cont.
• Almost every type and size of a system will have some
security needs. Although it
may be argued that a throw-away utility, written to solve a
singular problem, might
not have any security needs, if that utility finds a useful place
beyond its original
problem scope, the utility is likely to develop security needs at
some point.
• Complex business systems typically have security
requirements up front. In addition,
either the implementing organization or the users of the system
or both will have
security expectations of the system. But complexity is not the
determiner of security.
• Thus, the answer as to whether a system requires an ARA and
threat model is tied
to the answers to a number of key questions:
• What is the expected deployment model?
• What will be the distribution?
• What language and execution environment will run the
Chapter 1: Introduction – Cont.
• Size, business criticality, expenses, and complexity, among
others, are dimensions
that may have a bearing, but are not solely deterministic. I have
seen many
Enterprise IT efforts fail, simply because there was an attempt
to reduce this early
decision to a two-dimensional space, yes/no questions. These
simplifications
invariably attempted to achieve efficiencies at scale.
Unfortunately, in practice today,
the decision to analyze the architecture of a system for security
is a complex,
multivariate problem.
• The answer to “Systems? Which systems?” cannot be overly
simplified. Depending
upon use cases and intentions, analyzing almost any system may
produce significant
security return on time invested. And, concomitantly, in a world
of limited resources,
some systems and, certainly, certain types of system changes
may be passed without
review. The organization may be willing to accept a certain
amount of unknown risk
asa result of not conducting a review.
Chapter 1: Summary
Information assurance is achieved when information and
information systems are
protected against attacks through the application of security
services such as availability,
integrity, authentication, confidentiality, and nonrepudiation.
The application of these services
should be based on the protect, detect, and react paradigm.
• This means that in addition to incorporating protection
mechanisms,
organizations need to expect attacks and include attack
detection
tools and procedures that allow them to react to and recover
from
these unexpected attacks.
University of the Cumberlands�School of Computer &
Information Sciences��WelcomeChapter 1: Introduction
Chapter 1: Introduction – Cont. Chapter 1: Introduction – Cont.
Chapter 1: Introduction – Cont. Chapter 1: Introduction – Cont.
Chapter 1: Introduction – Cont. Chapter 1: Introduction – Cont.
Chapter 1: Introduction – Cont. Chapter 1: Introduction – Cont.
Chapter 1: Summary
In this week's discussion, I watched a session on the theory of
cognitive therapy. In this session, the client had worked with
the therapist about how they feel uncomfortable in a group
setting, and are having a hard time in the group discussion.
During the session, there was one automatic thought that stood
out to me. The client recalled about a class that she has, and an
inclusion activity that she was required to participate in it. The
client said, “I know it is called an inclusion activity, but it feels
the opposite for me”(Flanagan, Flanagan Retrieved 2020 ).
When she brought up this mental event, she simply stated how
she felt about the event without processing the outcomes of it.
The other automatic thought that I observed while watching the
session is when the client brought up her friend in the session.
This is a positive automatic thought when I observed it. As the
therapist continued with the session, the client said: “I just want
to be a helpful person with my friend” (Flanagan, Flanagan
Retrieved 2020 ). When the client said this, it was a way that
she remembered the time and situation that she could be of
helpfulness to her friend.
When we talk about the topic of cognitive distortions, I saw one
of the distortions specifically throughout the whole session. The
one distortion that I saw, was the concept of selective
abstraction (Corey 2017). What this means is that you come to
conclusions based on only part of the information. When you
come to these conclusions, they can sometimes focus mostly on
the weaknesses and not the successes (Corey 2017). This is the
client talking about themselves. In the video, the client talks
about how they are just wanting to be heard and how they think
that they are unable to speak and they would not say the correct
things when they finally get the courage to speak as well. The
counselor also used a multi-column worksheet, that I liked. In
my opinion, it was a way that you could understand different
issues that could be bothering the client and how they link
together without making that connection firsthand. The
counselor made the connection, as the session went on. It
happened organically which I liked as a whole.
As I was watching the session unfold, I liked the cognitive
theory. For me, it is a good balance of control between the
counselor and the client. I think that having an agenda through
the session is a good idea and even better when the client makes
the agenda with you. This type of theory requires more of a
counselor driven aspect and has more responsibility that needs
to come from the counselor. This makes me comfortable
because while there is an agenda, we do not always have to
touch on every aspect. It is a flexible session, because you may
discover new complications that could not be on the agenda that
the client may have not thought were issues. That is why
driving the session is important for the counselor.
Automatic thoughts are the negative thoughts that a person has
about themselves or a situation. These thoughts need to be
challenged with evidence to either support or deny their
accuracy. When the evidence does not support the thought, a
new alternative is introduced. However, if the automatic
thought is supported by evidence, the counselor can help the
client come up with an action plan to solve the problem (Corey,
2017). In the video, Meredith thinks several negative things
about herself during the activity in her stats class. She asks
herself, "Oh God, what am I going to say?" and "Why can't I be
articulate?" She also tells herself, "I never feel comfortable."
and "What I say doesn't matter much."
Cognitive distortions are errors in interpretation of our
cognitions (Corey, 2017). In the video, Meredith displayed
dichotomous thinking. She perceived that she was "never" able
to be clever or respond appropriately during the activity in her
stats class. With the help of the counselor, she was able to
realize that she did see situations as either black or white, the
extremes. At first, she was unable to recognize that she was a
"clever" storyteller sometimes. Her use of the word "never"
when saying how comfortable she was in groups also shows that
she is focused on the extremes.
I think the use of a multi column worksheet can be helpful for
both the counselor and the client if it is shared with them. It is
a great way to organize what the client is saying and can also
help clarify or categorize the client's thoughts as helpful or
unhelpful (Sommers-Flanagan, 2012, 2:41:46). Having the
thoughts written down can also show the client how distorted
they are. Sometimes, when someone sees something in writing,
he or she realizes that what they are thinking is not rational.
They can also see patterns such as how often they use words
such as "always" or "never."
I think that this approach has a lot of value with some clients.
Some clients may enter into therapy in such a state of crisis,
that they need the counselor to be more directive. Sometimes
clients may have an additional diagnosis that makes it hard for
them to process information. For example, individuals with
autism, often see things in concrete terms. They could benefit
from a counselor taking the lead and helping them reframe their
thoughts. I am somewhat comfortable with this approach
because I see the effectiveness of it. In order for my comfort
level to increase, I need to be able to practice it and see
examples of how it is used with children.
Corey, G. (2017). Theory and practice of counseling and
psychotherapy (10th ed.). Boston, MA: Cengage Learning.
Sommers-Flanagan, J., & Sommers-Flanagan, R.
(2012). Counseling and psychotherapy theories in context and
practice [Video]. Available from
psychotherapy.net/.bridges.searchmobius.org/stream/mobap/vid
eo?vid=277
Reply
63727_fm_rev02.indd 6 18/09/15 11:54 AM
www.acetxt.com
Engaged with you.
www.cengage.com
Source Code: 14M-AA0105
Tap into engagement
MindTap empowers you to produce your best work—
consistently.
MindTap is designed to help you master the material.
Interactive
videos, animations, and activities create a learning path
designed
by your instructor to guide you through the course and focus on
what’s important.
Tap into more info at: www.cengage.com/mindtap
“MindTap was very useful – it was easy to follow and
everything
was right there.”
— Student, San Jose State University
“I’m definitely more engaged because of MindTap.”
— Student, University of Central Florida
“MindTap puts practice questions in a format that works well
for me.”
— Student, Franciscan University of Steubenville
MindTap helps you stay
organized and efficient
by giving you the study tools to master the material.
MindTap empowers
and motivates
with information that shows where you stand at all times—both
individually and compared to the highest performers in class.
MindTap delivers real-world
activities and assignments
that will help you in your academic life as well as your career.
Flashcards
readspeaker
progress app
MyNotes
& highlights
selF QuizziNg
& practice
63727_Insert 2_ptg01_hr.indd 1 05/10/15 2:10 PM
Copyright 2017 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
www.acetxt.com
Theories at-a-Glance
The tables in this book compare theories over a range of topics,
thereby providing you with
the ability to easily compare, contrast, and grasp the practical
aspects of each theory. These
tables also serve as invaluable resources that can be used to
review the key concepts, philoso-
phies, limitations, contributions to multicultural counseling,
applications, techniques, and
goals of all theories in this text.
The following chart provides a convenient guide to the tables in
this text.
Pages
6 –7 Table 1.1 Overview of Contemporary Counseling Models
62– 63 Table 4.1 Ego-Defense Mechanisms
65– 66 Table 4.2 Comparison of Freud’s Psychosexual Stages
and Erikson’s
Psychosocial Stages
432 Table 15.1 The Basic Philosophies
433– 434 Table 15.2 Key Concepts
438 Table 15.3 Goals of Therapy
441– 442 Table 15.4 The Therapeutic Relationship
443– 444 Table 15.5 Techniques of Therapy
444– 445 Table 15.6 Applications of the Approaches
446 Table 15.7 Contributions to Multicultural Counseling
447 Table 15.8 Limitations in Multicultural Counseling
448– 449 Table 15.9 Contributions of the Approaches
449– 450 Table 15.10 Limitations of the Approaches
63727_Insert 3_ptg01_hr.indd 1 30/09/15 10:13 AM
Copyright 2017 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
www.acetxt.com
Overview of Focus Questions for the Theories
For the chapters dealing with the different theories, you will
have a basic understand-
ing of this book if you can answer the following questions as
they apply to each of the eleven
theories:
Who are the key figures (founder or founders) associated with
the approach?
What are some of the basic assumptions underlying this
approach?
What are a few of the key concepts that are essential to this
theory?
What do you consider to be the most important goals of this
therapy?
What is the role the therapeutic relationship plays in terms of
therapy outcomes?
What are a few of the techniques from this therapy model that
you would want to incorporate
into your counseling practice?
What are some of the ways that this theory is applied to client
populations, settings, and treat-
ment of problems?
What do you see as the major strength of this theory from a
diversity perspective?
What do you see as the major shortcoming of this theory from a
diversity perspective?
What do you consider to be the most significant contribution of
this approach?
What do you consider to be the most significant limitation of
this approach?
63727_Insert 3_ptg01_hr.indd 2 30/09/15 10:13 AM
Copyright 2017 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
www.acetxt.com
Australia • Brazil • Mexico • Singapore • United Kingdom •
United States
Gerald Corey
California State University, Fullerton
Diplomate in Counseling Psychology,
American Board of Professional Psychology
Theory and PracTice
of counseling and
PsychoTheraPy
Tenth Edition
63727_fm_rev02.indd 1 20/10/15 10:25 AM
Copyright 2017 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
www.acetxt.com
63727_fm_rev02.indd 6 18/09/15 11:54 AM
This is an electronic version of the print textbook. Due to
electronic rights restrictions,
some third party content may be suppressed. Editorial review
has deemed that any suppressed
content does not materially affect the overall learning
experience. The publisher reserves the right
to remove content from this title at any time if subsequent
rights restrictions require it. For
valuable information on pricing, previous editions, changes to
current editions, and alternate
formats, please visit www.cengage.com/highered to search by
ISBN#, author, title, or keyword for
materials in your areas of interest.
Important Notice: Media content referenced within the
product description or the product
text may not be available in the eBook version.
Copyright 2017 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
www.acetxt.com
Printed in the United States of America
Print Number: 01 Print Year: 2015
© 2017, 2013, Cengage Learning
ALL RIGHTS RESERVED. No part of this work covered by the
copyright
herein may be reproduced, transmitted, stored, or used in any
form
or by any means graphic, electronic, or mechanical, including
but not
limited to photocopying, recording, scanning, digitizing, taping,
Web
distribution, information networks, or information storage and
retrieval
systems, except as permitted under Section 107 or 108 of the
1976
United States Copyright Act, without the prior written
permission of
the publisher.
Theory and Practice of Counseling and
Psychotherapy, Tenth Edition
Gerald Corey
Product Director: Jon David Hague
Product Manager: Julie Martinez
Content Developer: Kyra Kane
Product Assistant: Stephen Lagos
Marketing Manager: Margaux Cameron
Content Project Manager: Rita Jaramillo
Art Director: Vernon Boes
Manufacturing Planner: Judy Inouye
Production Service:
Cenveo® Publisher Services
Text and Cover Designer: Cheryl Carrington
Cover Image: ©Purestock/Getty Images
Compositor: Cenveo® Publisher Services
For product information and technology assistance, contact us at
Cengage Learning Customer & Sales Support, 1-800-354-9706.
For permission to use material from this text or product,
submit all requests online at www.cengage.com/permissions.
Further permissions questions can be e-mailed to
[email protected]
Library of Congress Control Number: 2015948206
Student Edition:
ISBN: 10- 1305263727
Loose-leaf Edition:
ISBN: 978-1-305-26372-7
Cengage Learning
20 Channel Center Street
Boston, MA 02210
USA
Cengage Learning is a leading provider of customized learning
solutions
with employees residing in nearly 40 different countries and
sales in more
than 125 countries around the world. Find your local
representative at
www.cengage.com.
Cengage Learning products are represented in Canada by
Nelson Education, Ltd.
To learn more about Cengage Learning
Solution
s, visit www.cengage.com.
Purchase any of our products at your local college store or at
our
preferred online store www.cengagebrain.com.
63727_fm_rev02.indd 2 18/09/15 11:54 AM
WCN: 02-200-203
Copyright 2017 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
www.acetxt.com
To the founders and key figures of the theories presented
in this book—with appreciation for their contributions
to contemporary counseling practice.
63727_fm_rev02.indd 3 18/09/15 11:54 AM
Copyright 2017 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
www.acetxt.com
iv
abouT The auThor
gerald corey is Professor Emeritus of Human Services and
Counseling at
California State University at Fullerton. He received his
doctorate in counseling
from the University of Southern California. He is a Diplomate
in Counseling Psy-
chology, American Board of Professional Psychology; a
licensed psychologist; and a
National Certified Counselor. He is a Fellow of the American
Psychological Associa-
tion (Division 17, Counseling Psychology; and Division 49,
Group Psychotherapy);
a Fellow of the American Counseling Association; and a Fellow
of the Association
for Specialists in Group Work. He also holds memberships in
the American Group
Psychotherapy Association; the American Mental Health
Counselors Association;
the Association for Spiritual, Ethical, and Religious Values in
Counseling; the Asso-
ciation for Counselor Education and Supervision; and the
Western Association of
Counselor Education and Supervision. Both Jerry and Marianne
Corey received the
Lifetime Achievement Award from the American Mental Health
Counselors Associ-
ation in 2011, and both of them received the Eminent Career
Award from ASGW in
2001. Jerry was given the Outstanding Professor of the Year
Award from California
State University at Fullerton in 1991. He regularly teaches both
undergraduate and
graduate courses in group counseling and ethics in counseling.
He is the author or
coauthor of 15 textbooks in counseling currently in print, along
with more than 60
journal articles and book chapters. Several of his books have
been translated into
other languages. Theory and Practice of Counseling and
Psychotherapy has been trans-
lated into Arabic, Indonesian, Portuguese, Turkish, Korean, and
Chinese. Theory and
Practice of Group Counseling has been translated into Korean,
Chinese, Spanish, and
Russian. Issues and Ethics in the Helping Professions has been
translated into Korean,
Japanese, and Chinese.
In the past 40 years Jerry and Marianne Corey have conducted
group counsel-
ing training workshops for mental health professionals at many
universities in the
United States as well as in Canada, Mexico, China, Hong Kong,
Korea, Germany,
Belgium, Scotland, England, and Ireland. In his leisure time,
Jerry likes to travel,
hike and bicycle in the mountains, and drive his 1931 Model A
Ford. Marianne
and Jerry have been married since 1964. They have two adult
daughters, Heidi and
Cindy, two granddaughters (Kyla and Keegan), and one
grandson (Corey).
Recent publications by Jerry Corey, all with Cengage Learning,
include:
�� Theory and Practice of Group Counseling, Ninth Edition
(and Student Manual)
(2016)
�� Becoming a Helper, Seventh Edition (2016, with Marianne
Schneider
Corey)
�� Issues and Ethics in the Helping Professions, Ninth Edition
(2015, with Mari-
anne Schneider Corey, Cindy Corey, and Patrick Callanan)
�� Group Techniques, Fourth Edition (2015, with Marianne
Schneider
Corey, Patrick Callanan, and J. Michael Russell)
�� Groups: Process and Practice, Ninth Edition (2014, with
Marianne Schnei-
der Corey and Cindy Corey)
iv
63727_fm_rev02.indd 4 18/09/15 11:54 AM
Copyright 2017 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
www.acetxt.com
v
�� I Never Knew I Had a Choice, Tenth Edition (2014, with
Marianne Schneider
Corey)
�� Case Approach to Counseling and Psychotherapy, Eighth
Edition (2013)
�� The Art of Integrative Counseling, Third Edition (2013)
Jerry Corey is coauthor (with Barbara Herlihy) of Boundary
Issues in Counseling:
Multiple Roles and Responsibilities, Third Edition (2015) and
ACA Ethical Standards Case-
book, Seventh Edition (2015); he is coauthor (with Robert
Haynes, Patrice Moulton,
and Michelle Muratori) of Clinical Supervision in the Helping
Professions: A Practical
Guide, Second Edition (2010); he is the author of Creating Your
Professional Path: Les-
sons From My Journey (2010). All four of these books are
published by the American
Counseling Association.
He has also made several educational DVD programs on various
aspects of
counseling practice: (1) Ethics in Action: DVD and Workbook
(2015, with Marianne
Schneider Corey and Robert Haynes); (2) Groups in Action:
Evolution and Challenges
DVD and Workbook (2014, with Marianne Schneider Corey and
Robert Haynes);
(3) DVD for Theory and Practice of Counseling and
Psychotherapy: The Case of Stan and
Lecturettes (2013); (4) DVD for Integrative Counseling: The
Case of Ruth and Lecturettes (2013,
with Robert Haynes); and (5) DVD for Theory and Practice of
Group Counseling (2012).
All of these programs are available through Cengage Learning.
63727_fm_rev02.indd 5 18/09/15 11:54 AM
Copyright 2017 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
www.acetxt.com
63727_fm_rev02.indd 6 18/09/15 11:54 AM
Copyright 2017 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
Preface xi
P A R T 1
BASIC ISSUES IN
COUNSELING PRACTICE
1 Introduction and Overview 1
introduction 2
Where I Stand 3
Suggestions for Using the Book 5
Overview of the Theory Chapters 6
Introduction to the Case of Stan 9
Introduction to the Case of Gwen 13
2 The Counselor: Person and
Professional 17
introduction 18
The Counselor as a Therapeutic Person 18
Personal Therapy for the Counselor 20
The Counselor’s Values and the Therapeutic Process 22
Becoming an Effective Multicultural Counselor 25
Issues Faced by Beginning Therapists 28
Summary 35
3 Ethical Issues in Counseling
Practice 37
introduction 38
Putting Clients’ Needs Before Your Own 38
Ethical Decision Making 39
The Right of Informed Consent 41
Dimensions of Confidentiality 42
Ethical Issues From a Multicultural Perspective 43
Ethical Issues in the Assessment Process 45
Ethical Aspects of Evidence-Based Practice 48
Managing Multiple Relationships in Counseling
Practice 49
Becoming an Ethical Counselor 52
Summary 53
Where to Go From Here 53
Recommended Supplementary Readings for
Part 1 54
P A R T 2
THEORIES AND TECHNIQUES
OF COUNSELING
4 Psychoanalytic Therapy 57
introduction 58
Key Concepts 59
The Therapeutic Process 66
Application: Therapeutic Techniques and
Procedures 72
Jung’s Perspective on the Development of
Personality 77
Contemporary Trends: Object-Relations
Theory, Self Psychology, and Relational
Psychoanalysis 79
Psychoanalytic Therapy From a Multicultural
Perspective 84
Psychoanalytic Therapy applied to the case of
stan 85
Psychoanalytic Therapy applied to the case of
gwen 87
Summary and Evaluation 89
Self-Reflection and Discussion Questions 92
Where to Go From Here 92
Recommended Supplementary Readings 93
5 Adlerian Therapy 95
introduction 98
Key Concepts 98
The Therapeutic Process 104
Application: Therapeutic Techniques and
Procedures 108
Adlerian Therapy From a Multicultural
Perspective 119
adlerian Therapy applied to the case of stan 121
adlerian Therapy applied to the case of gwen 122
Contents
vii
63727_fm_rev02.indd 7 18/09/15 11:54 AM
Copyright 2017 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
viii C o n t e n t s
Summary and Evaluation 124
Self-Reflection and Discussion Questions 126
Where to Go From Here 127
Recommended Supplementary Readings 128
6 Existential Therapy 129
introduction 132
Key Concepts 137
The Therapeutic Process 146
Application: Therapeutic Techniques and
Procedures 149
Existential Therapy From a Multicultural
Perspective 153
existential Therapy applied to the case
of stan 155
existential Therapy applied to the case
of gwen 156
Summary and Evaluation 157
Self-Reflection and Discussion Questions 160
Where to Go From Here 160
Recommended Supplementary Readings 162
7 Person-Centered Therapy 163
introduction 165
Key Concepts 170
The Therapeutic Process 171
Application: Therapeutic Techniques and
Procedures 176
Person-Centered Expressive Arts
Therapy 180
Motivational Interviewing 182
Person-Centered Therapy From a Multicultural
Perspective 184
Person-centered Therapy applied to the case
of stan 186
Person-centered Therapy applied to the case
of gwen 187
Summary and Evaluation 190
Self-Reflection and Discussion Questions 193
Where to Go From Here 193
Recommended Supplementary Readings 195
8 Gestalt Therapy 197
introduction 199
Key Concepts 200
The Therapeutic Process 206
Application: Therapeutic Techniques and
Procedures 211
Gestalt Therapy From a Multicultural
Perspective 220
gestalt Therapy applied to the case of stan 221
gestalt Therapy applied to the case of gwen 223
Summary and Evaluation 224
Self-Reflection and Discussion Questions 227
Where to Go From Here 227
Recommended Supplementary Readings 229
9 Behavior Therapy 231
introduction 233
Key Concepts 236
The Therapeutic Process 238
Application: Therapeutic Techniques and
Procedures 240
Behavior Therapy From a Multicultural
Perspective 258
behavior Therapy applied to the case of stan 259
behavior Therapy applied to the case of gwen 260
Summary and Evaluation 262
Self-Reflection and Discussion Questions 265
Where to Go From Here 266
Recommended Supplementary Readings 267
10 Cognitive Behavior Therapy 269
introduction 270
Albert Ellis’s Rational Emotive Behavior
Therapy 270
Key Concepts 272
The Therapeutic Process 273
Application: Therapeutic Techniques and
Procedures 275
Aaron Beck’s Cognitive Therapy 281
Christine Padesky and Kathleen Mooney’s
Strengths-Based Cognitive Behavioral Therapy 289
Donald Meichenbaum’s Cognitive Behavior
Modification 293
Cognitive Behavior Therapy From a Multicultural
Perspective 298
cognitive behavior Therapy applied to the case
of stan 300
cognitive behavior Therapy applied to the case
of gwen 302
Summary and Evaluation 303
63727_fm_rev02.indd 8 18/09/15 11:54 AM
Copyright 2017 Cengage Learning. All Rights Reserved. May
not be copied, scanned, or duplicated, in whole or in part. Due
to electronic rights, some third party content may be suppressed
from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does
not materially affect the overall learning experience. Cengage
Learning reserves the right to remove additional content at any
time if subsequent rights restrictions require it.
C o n t e n t s ix
Self-Reflection and Discussion Questions 307
Where to Go From Here 308
Recommended Supplementary Readings 310
11 Choice Theory/Reality
Therapy 311
introduction 313
Key Concepts 314
The Therapeutic Process 318
Application: Therapeutic Techniques and
Procedures 320
Choice Theory/Reality Therapy From a Multicultural
Perspective 327
reality Therapy applied to the case of stan 329
reality Therapy applied to the case of gwen 331
Summary and Evaluation 332
Self-Reflection and Discussion Questions 334
Where to Go From Here 334
Recommended Supplementary Readings 336
12 Feminist Therapy 337
introduction 339
Key Concepts 341
The Therapeutic Process 345
Application: Therapeutic Techniques and
Procedures 348
Feminist Therapy From a Multicultural
and Social Justice Perspective 354
feminist Therapy applied to the case of stan 355
feminist Therapy applied to the case of gwen 357
Summary and Evaluation 360
Self-Reflection and Discussion Questions 364
Where to Go From Here 364
Recommended Supplementary Readings 366
13 Postmodern Approaches 367
Some Contemporary Founders of Postmodern
Therapies 368
Introduction to Social Constructionism 368

More Related Content

Similar to 1. While watching the video I observed Merideth’s automatic though.docx

EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakaleAakash Takale
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)abhimanyubhogwan
 
VulnerabilityRewardsProgram
VulnerabilityRewardsProgramVulnerabilityRewardsProgram
VulnerabilityRewardsProgramTaha Kachwala
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceVishal Kumar
 
Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Saurabh Upadhyay
 
aMs Southeast Asia 2021 : Insider risk protection and containment in microsof...
aMs Southeast Asia 2021 : Insider risk protection and containment in microsof...aMs Southeast Asia 2021 : Insider risk protection and containment in microsof...
aMs Southeast Asia 2021 : Insider risk protection and containment in microsof...Mitul Rana
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfJawaidAbdulHameed
 
Session on Cyber security and Ethical Hacking.pptx
Session on Cyber security and Ethical Hacking.pptxSession on Cyber security and Ethical Hacking.pptx
Session on Cyber security and Ethical Hacking.pptxVicky Tyagi
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxjenkinsmandie
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldTEWMAGAZINE
 
Running Head 2Week #8 MidTerm Assignment .docx
Running Head    2Week #8 MidTerm Assignment               .docxRunning Head    2Week #8 MidTerm Assignment               .docx
Running Head 2Week #8 MidTerm Assignment .docxhealdkathaleen
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingSaqib Raza
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackMekhi Da ‘Quay Daniels
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-studyhomeworkping4
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopDigit Oktavianto
 

Similar to 1. While watching the video I observed Merideth’s automatic though.docx (20)

EthicalHacking_AakashTakale
EthicalHacking_AakashTakaleEthicalHacking_AakashTakale
EthicalHacking_AakashTakale
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
VulnerabilityRewardsProgram
VulnerabilityRewardsProgramVulnerabilityRewardsProgram
VulnerabilityRewardsProgram
 
Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
Ethical hacking concept-Part 1
Ethical hacking concept-Part 1Ethical hacking concept-Part 1
Ethical hacking concept-Part 1
 
aMs Southeast Asia 2021 : Insider risk protection and containment in microsof...
aMs Southeast Asia 2021 : Insider risk protection and containment in microsof...aMs Southeast Asia 2021 : Insider risk protection and containment in microsof...
aMs Southeast Asia 2021 : Insider risk protection and containment in microsof...
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
 
Session on Cyber security and Ethical Hacking.pptx
Session on Cyber security and Ethical Hacking.pptxSession on Cyber security and Ethical Hacking.pptx
Session on Cyber security and Ethical Hacking.pptx
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
 
Network Security
Network SecurityNetwork Security
Network Security
 
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise WorldKey Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
Key Cybersecurity Risks and Mitigation Strategies in 2023 | The Enterprise World
 
Running Head 2Week #8 MidTerm Assignment .docx
Running Head    2Week #8 MidTerm Assignment               .docxRunning Head    2Week #8 MidTerm Assignment               .docx
Running Head 2Week #8 MidTerm Assignment .docx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
61370436 main-case-study
61370436 main-case-study61370436 main-case-study
61370436 main-case-study
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 

More from croysierkathey

1.  Discuss the organization and the family role in every one of the.docx
1.  Discuss the organization and the family role in every one of the.docx1.  Discuss the organization and the family role in every one of the.docx
1.  Discuss the organization and the family role in every one of the.docxcroysierkathey
 
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docxcroysierkathey
 
1.Purpose the purpose of this essay is to spread awareness .docx
1.Purpose the purpose of this essay is to spread awareness .docx1.Purpose the purpose of this essay is to spread awareness .docx
1.Purpose the purpose of this essay is to spread awareness .docxcroysierkathey
 
1.  Tell us why it is your favorite film.2.  Talk about the .docx
1.  Tell us why it is your favorite film.2.  Talk about the .docx1.  Tell us why it is your favorite film.2.  Talk about the .docx
1.  Tell us why it is your favorite film.2.  Talk about the .docxcroysierkathey
 
1.What are the main issues facing Fargo and Town Manager Susan.docx
1.What are the main issues facing Fargo and Town Manager Susan.docx1.What are the main issues facing Fargo and Town Manager Susan.docx
1.What are the main issues facing Fargo and Town Manager Susan.docxcroysierkathey
 
1.Writing Practice in Reading a PhotographAttached Files.docx
1.Writing Practice in Reading a PhotographAttached Files.docx1.Writing Practice in Reading a PhotographAttached Files.docx
1.Writing Practice in Reading a PhotographAttached Files.docxcroysierkathey
 
1.Some say that analytics in general dehumanize managerial activitie.docx
1.Some say that analytics in general dehumanize managerial activitie.docx1.Some say that analytics in general dehumanize managerial activitie.docx
1.Some say that analytics in general dehumanize managerial activitie.docxcroysierkathey
 
1.What is the psychological term for the symptoms James experiences .docx
1.What is the psychological term for the symptoms James experiences .docx1.What is the psychological term for the symptoms James experiences .docx
1.What is the psychological term for the symptoms James experiences .docxcroysierkathey
 
1.Write at least 500 words discussing the benefits of using R with H.docx
1.Write at least 500 words discussing the benefits of using R with H.docx1.Write at least 500 words discussing the benefits of using R with H.docx
1.Write at least 500 words discussing the benefits of using R with H.docxcroysierkathey
 
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docxcroysierkathey
 
1.  Discuss the cultural development of the Japanese and the Jewis.docx
1.  Discuss the cultural development of the Japanese and the Jewis.docx1.  Discuss the cultural development of the Japanese and the Jewis.docx
1.  Discuss the cultural development of the Japanese and the Jewis.docxcroysierkathey
 
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
1.  Discuss at least 2  contextual factors(family, peers,  school,.docxcroysierkathey
 
1.Write at least 500 words in APA format discussing how to use senti.docx
1.Write at least 500 words in APA format discussing how to use senti.docx1.Write at least 500 words in APA format discussing how to use senti.docx
1.Write at least 500 words in APA format discussing how to use senti.docxcroysierkathey
 
1.The following clause was added to the Food and Drug Actthe S.docx
1.The following clause was added to the Food and Drug Actthe S.docx1.The following clause was added to the Food and Drug Actthe S.docx
1.The following clause was added to the Food and Drug Actthe S.docxcroysierkathey
 
1.What are social determinants of health  Explain how social determ.docx
1.What are social determinants of health  Explain how social determ.docx1.What are social determinants of health  Explain how social determ.docx
1.What are social determinants of health  Explain how social determ.docxcroysierkathey
 
1.This week, we’ve been introduced to the humanities and have ta.docx
1.This week, we’ve been introduced to the humanities and have ta.docx1.This week, we’ve been introduced to the humanities and have ta.docx
1.This week, we’ve been introduced to the humanities and have ta.docxcroysierkathey
 
1.What are barriers to listening2.Communicators identif.docx
1.What are barriers to listening2.Communicators identif.docx1.What are barriers to listening2.Communicators identif.docx
1.What are barriers to listening2.Communicators identif.docxcroysierkathey
 
1.Timeline description and details There are multiple way.docx
1.Timeline description and details There are multiple way.docx1.Timeline description and details There are multiple way.docx
1.Timeline description and details There are multiple way.docxcroysierkathey
 
1.The PresidentArticle II of the Constitution establishe.docx
1.The PresidentArticle II of the Constitution establishe.docx1.The PresidentArticle II of the Constitution establishe.docx
1.The PresidentArticle II of the Constitution establishe.docxcroysierkathey
 
1.What other potential root causes might influence patient fal.docx
1.What other potential root causes might influence patient fal.docx1.What other potential root causes might influence patient fal.docx
1.What other potential root causes might influence patient fal.docxcroysierkathey
 

More from croysierkathey (20)

1.  Discuss the organization and the family role in every one of the.docx
1.  Discuss the organization and the family role in every one of the.docx1.  Discuss the organization and the family role in every one of the.docx
1.  Discuss the organization and the family role in every one of the.docx
 
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
1.  Compare and contrast DEmilios Capitalism and Gay Identity .docx
 
1.Purpose the purpose of this essay is to spread awareness .docx
1.Purpose the purpose of this essay is to spread awareness .docx1.Purpose the purpose of this essay is to spread awareness .docx
1.Purpose the purpose of this essay is to spread awareness .docx
 
1.  Tell us why it is your favorite film.2.  Talk about the .docx
1.  Tell us why it is your favorite film.2.  Talk about the .docx1.  Tell us why it is your favorite film.2.  Talk about the .docx
1.  Tell us why it is your favorite film.2.  Talk about the .docx
 
1.What are the main issues facing Fargo and Town Manager Susan.docx
1.What are the main issues facing Fargo and Town Manager Susan.docx1.What are the main issues facing Fargo and Town Manager Susan.docx
1.What are the main issues facing Fargo and Town Manager Susan.docx
 
1.Writing Practice in Reading a PhotographAttached Files.docx
1.Writing Practice in Reading a PhotographAttached Files.docx1.Writing Practice in Reading a PhotographAttached Files.docx
1.Writing Practice in Reading a PhotographAttached Files.docx
 
1.Some say that analytics in general dehumanize managerial activitie.docx
1.Some say that analytics in general dehumanize managerial activitie.docx1.Some say that analytics in general dehumanize managerial activitie.docx
1.Some say that analytics in general dehumanize managerial activitie.docx
 
1.What is the psychological term for the symptoms James experiences .docx
1.What is the psychological term for the symptoms James experiences .docx1.What is the psychological term for the symptoms James experiences .docx
1.What is the psychological term for the symptoms James experiences .docx
 
1.Write at least 500 words discussing the benefits of using R with H.docx
1.Write at least 500 words discussing the benefits of using R with H.docx1.Write at least 500 words discussing the benefits of using R with H.docx
1.Write at least 500 words discussing the benefits of using R with H.docx
 
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
1.What is Starbucks’ ROA for 2012, 2011, and 2010 Why might focusin.docx
 
1.  Discuss the cultural development of the Japanese and the Jewis.docx
1.  Discuss the cultural development of the Japanese and the Jewis.docx1.  Discuss the cultural development of the Japanese and the Jewis.docx
1.  Discuss the cultural development of the Japanese and the Jewis.docx
 
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
1.  Discuss at least 2  contextual factors(family, peers,  school,.docx
 
1.Write at least 500 words in APA format discussing how to use senti.docx
1.Write at least 500 words in APA format discussing how to use senti.docx1.Write at least 500 words in APA format discussing how to use senti.docx
1.Write at least 500 words in APA format discussing how to use senti.docx
 
1.The following clause was added to the Food and Drug Actthe S.docx
1.The following clause was added to the Food and Drug Actthe S.docx1.The following clause was added to the Food and Drug Actthe S.docx
1.The following clause was added to the Food and Drug Actthe S.docx
 
1.What are social determinants of health  Explain how social determ.docx
1.What are social determinants of health  Explain how social determ.docx1.What are social determinants of health  Explain how social determ.docx
1.What are social determinants of health  Explain how social determ.docx
 
1.This week, we’ve been introduced to the humanities and have ta.docx
1.This week, we’ve been introduced to the humanities and have ta.docx1.This week, we’ve been introduced to the humanities and have ta.docx
1.This week, we’ve been introduced to the humanities and have ta.docx
 
1.What are barriers to listening2.Communicators identif.docx
1.What are barriers to listening2.Communicators identif.docx1.What are barriers to listening2.Communicators identif.docx
1.What are barriers to listening2.Communicators identif.docx
 
1.Timeline description and details There are multiple way.docx
1.Timeline description and details There are multiple way.docx1.Timeline description and details There are multiple way.docx
1.Timeline description and details There are multiple way.docx
 
1.The PresidentArticle II of the Constitution establishe.docx
1.The PresidentArticle II of the Constitution establishe.docx1.The PresidentArticle II of the Constitution establishe.docx
1.The PresidentArticle II of the Constitution establishe.docx
 
1.What other potential root causes might influence patient fal.docx
1.What other potential root causes might influence patient fal.docx1.What other potential root causes might influence patient fal.docx
1.What other potential root causes might influence patient fal.docx
 

Recently uploaded

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 

1. While watching the video I observed Merideth’s automatic though.docx

  • 1. 1. While watching the video I observed Merideth’s automatic thoughts on herself. Some of the things she discussed herself were that she was shy, she doesn’t feel like she could tell cool stories but has told good stories in the past. She sees herself as invisible. She thinks if she does something embarrassing she will end up alone. Merideth is very careful about conclusions about herself. I believe that Merideth is using labeling and mislabeling, which involves portraying one’s identity on the basis of imperfections and mistakes of the past. ( Corey,2018) She is using the ideas of imperfections and mistakes from past experiences to form the opinions of herself and her reality of her future. She feels people will judge her too harshly if she embarrasses herself. I think multi-column is a good way to chart the client's feelings about themselves and it also helps with their conclusions of how they feel about themselves. 2. I think that Cognitive theory is a great way to help the client determine their realization of their feelings about themselves. This is a way that the client can express their opinions about themselves and work with the therapist to develop ways to handle their insecurities. It does involve primary emotions and behaviors that can be used in the mental process. It encourages a hands-on approach and a deeper understanding of their behaviors. I personally like a more effective and direct approach. One that breaks down the issues into simple theories. It helps the client develop a sense of their surroundings and I feel it has a more lasting effect on the client. Corey, G. (2018). Theory and Practice of Counseling and Psychotherapy. Boston, MA: Cengage Learning.
  • 2. University of the Cumberlands School of Computer & Information Sciences ISOL-536 - Security Architecture & Design Chapter 2: The Art of Security Assessment Spring 2020 Dr. Errol Waithe Chapter 2: The Art of Security Assessment • 2.1 Why Art and Not Engineering? • 2.2 Introducing “The Process” • 2.3 Necessary Ingredients • 2.4 The Threat Landscape • 2.4.1 Who Are These Attackers? Why Do They Want to Attack My System? • 2.5 How Much Risk to Tolerate? • 2.6 Getting Started 2.1 Why Art and Not Engineering? The branch of science and technology concerned with the design, building, and use of engines, machines, and structures. Definition of “engineering”: • In contrast, a security architect must use her or his understanding of the
  • 3. currently active threat agents in order to apply these appropriately to a particular system. Whether a particular threat agent will aim at a particular system is as much a matter of understanding, knowledge, and experience as it is cold hard fact. Applying threat agents and their capabilities to any particular system is an essential activity within the art of threat modeling. Hence, a security assessment of an architecture is an act of craft. 2.2 Introducing “The Process” • Because we security architects have methodologies, or I should say, I have a map in my mind while I assess, I can allow myself to run down threads into details without losing the whole of both the architecture and the methodology. • Practitioners will express these steps in different ways, and there are certainly many different means to express the process, all of them valid. • This series of steps assumes that the analyst has sufficient understanding of system architecture and security architecture going into the analysis.
  • 4. 2.2 Introducing “The Process” – Cont. • As you read the following list, please remember that there are significant prerequisite understandings and knowledge domains that contribute to a successful ARA. • Collect the set of credible attack surfaces. • Enumerate threats for this type of system and its intended deployment • Consider threats’ usual attack methods. • Consider threats’ usual goals. • Risk assess each attack surface. Risk rating will help to prioritize attack. surfaces and remediation. • Factor in each existing security control (mitigations). • Intersect threat’s attack methods against the inputs and connections. These are the set of attack surfaces. • Enumerate inputs and connections 2.2 Introducing “The Process” – Cont. • An analysis must first uncover all the credible attack vectors of the system. This simple statement hides significant detail. At this point in this work, it may be sufficient to outline the following mnemonic, “ATASM.” Figure 2.1 graphically shows an ATASM flow:
  • 5. Figure 2.1 Architecture, threats, attack surfaces, and mitigations. 2.2 Introducing “The Process” – Cont. • These four steps are sketched in the Picture 2.1 – If we break these down into their constituent parts, we might have a list something like the following, more detailed list: • Diagram (and understand) the logical architecture of the system. • List all the possible threat agents for this type of system. • List the goals of each of these threat agents. • List the typical attack methods of the threat agents. • List the technical objectives of threat agents applying their attack methods. • Decompose (factor) the architecture to a level that exposes every possible attack surface. • Apply attack methods for expected goals to the attack surfaces. 2.3 Necessary Ingredients • Just as a good cook pulls out all the ingredients from the cupboards and arranges them for ready access, so the experienced assessor has at her fingertips information
  • 6. that must feed into the assessment. Figure 2.2 Knowledge sets that feed a security analysis. Figure 2.3 Strategy knowledge, structure information, and system specifi cs. 2.3 Necessary Ingredients – Cont. • Figure 2.3 places each contributing knowledge domain within the area for which it is most useful. If it helps you to remember, these are the “3 S’s.” Strategy, infrastructure and security structures, and specifications about the system help determine what is important: “Strategy, Structures, Specification.” Figure 2.3 Strategy knowledge, structure information, and system specifics. 2.4 The Threat Landscape • Differing groups target and attack different types of systems in different ways for different reasons. Each unique type of attacker is called a “threat agent.” The threat agent is simply an individual, organization, or group that is capable and motivated to promulgate an attack of one sort or another.
  • 7. • Threat agents are not created equal. • They have different goals. • They have different methods. • They have different capabilities and access. • They have different risk profiles and will go to quite different lengths to be successful. 2.4 The Threat Landscape – Cont. • There are three key attributes of human attackers, as follows: • Intelligence • Adaptivity • Creativity This means that whatever security is put into place can and will be probed, tested, and reverse engineered. 2.4.1 Who Are These Attackers? Why Do They Want to Attack My System? • Cyber crime can be an organized criminal’s “dream come true.” Attacks can be largely anonymous. Plenty of attack scenarios are invisible to the target until after success: Bank accounts can be drained in seconds. There’s typically no need for heavy handed thuggery, no guns, no physical interaction whatsoever. These activities can be
  • 8. conducted with far less risk than physical violence. “Clean crime?” 2.4.1 Who Are These Attackers? Why Do They Want to Attack My System? – Cont. • There are documented cases of criminals carefully targeting a particular organization. But even in this case, the attacks have gone after the weak links of the system, such as poorly constructed user passwords and unpatched systems with well-known vulnerabilities, rather than highly sophisticated attack scenarios making use of unknown vulnerabilities. • Further, there’s little incentive to carefully map out a particular person’s digital life. That’s too much trouble when there are so many (unfortunately) who don’t patch their systems and who use the same, easily guessed password for many systems. It’s a simple matter of time and effort. When not successful, move on to the next mark. 2.4.1 Who Are These Attackers? Why Do They Want to Attack My System? – Cont. • Sometimes a single set of data is targeted, and sometimes the attacks seem to be after whatever may be available. Multiple
  • 9. diversionary attacks may be exercised to hide the data theft. Note the level of sophistication here: • Carefully planned and coordinated • Highly secretive • Combination of techniques (sometimes highly sophisticated) 2.4.1 Who Are These Attackers? Why Do They Want to Attack My System? – Cont. • Figure 2.4 attempts to provide a visual mapping of the relationships between various attributes that we might associate with threat agents. This figure includes inanimate threats, with which we are not concerned here. Attributes include capabilities, activity level, risk tolerance, strength of the motivation, and reward goals. • Next slide - Figure 2.4 Threat agent attribute relationships. Chapter 2: Summary Information assurance is achieved when information and information systems are protected against attacks through the application of security services such as availability, integrity, authentication, confidentiality, and nonrepudiation. The application of these services
  • 10. should be based on the protect, detect, and react paradigm. • This means that in addition to incorporating protection mechanisms, organizations need to expect attacks and include attack detection tools and procedures that allow them to react to and recover from these unexpected attacks. University of the Cumberlands�School of Computer & Information Sciences��Chapter 2: The Art of Security Assessment 2.1 Why Art and Not Engineering? 2.2 Introducing “The Process”2.2 Introducing “The Process” – Cont. 2.2 Introducing “The Process” – Cont. 2.2 Introducing “The Process” – Cont. 2.3 Necessary Ingredients2.3 Necessary Ingredients – Cont. 2.4 The Threat Landscape2.4 The Threat Landscape – Cont. 2.4.1 Who Are These Attackers? Why Do They Want to Attack My System?2.4.1 Who Are These Attackers? Why Do They Want to Attack My System? – Cont. 2.4.1 Who Are These Attackers? Why Do They Want to Attack My System? – Cont. 2.4.1 Who Are These Attackers? Why Do They Want to Attack My System? – Cont. Slide Number 16Chapter 2: Summary University of the Cumberlands School of Computer & Information Sciences ISOL-536 - Security Architecture & Design Chapter 1: Introduction Spring 2020 Dr. Errol Waithe
  • 11. Welcome • Chapter 1: Introduction • 1.1 Breach! Fix It! • 1.2 Information Security, as Applied to Systems • 1.3 Applying Security to Any System Chapter 1: Introduction • 1.1 Breach! Fix It! • Advances in information security have been repeatedly driven by spectacular attacks and by the evolutionary advances of the attackers. • The password file for millions of customers was stolen through the front end of a web site pulling in 90% of a multi-billion dollar revenue stream. • The chance of an attempted attack of one kind or another is certain. The probability of a web attack is 100%; systems are being attacked and will be attacked regularly and continually. • Indeed, system complexity leads to increasing the difficulty of defense and, inversely, decreasing the difficulty of successful exploitation. The number of flows between systems can turn into what architects call, “spaghetti,” a seeming lack of order and regularity in the design.
  • 12. Chapter 1: Introduction – Cont. • If a breach or significant compromise and loss creates an opportunity, then that opportunity quite often is to build a security architecture practice. A major part or focus of that maturing security architecture practice will be the assessment of systems for the purpose of assuring that when deployed, the assessed systems contain appropriate security qualities and controls. • Sensitive data will be protected in storage, transmission, and processing. • Sensitive access will be controlled (need-to-know, authentication, and authorization). • Defenses will be appropriately redundant and layered to account for failure. • There will be no single point of failure in the controls. • Systems are maintained in such a way that they remain available for use. • Activity will be monitored for attack patterns and failures. Chapter 1: Introduction – Cont. • 1.2 Information Security, as Applied to Systems • Security architecture applies the principles of security to system
  • 13. architectures. • Without security architecture, the intrusion system (IDS) might be distinct and independent from the firewalls (perimeter). Firewalls and IDS would then be unconnected and independent from anti-virus and anti-malware on the endpoint systems and entirely independent of server protections. • The security architect first uncovers the intentions and security needs of the organization: open and trusting or tightly controlled, the data sensitivities, and so forth. Chapter 1: Introduction – Cont. • When standards do not match what can actually be achieved, the standards become empty ideals. In such a case, engineers’ confidence will be shaken; system project teams are quite likely to ignore standards, or make up their own. Security personnel will lose considerable influence. Therefore, as we shall see, it’s important that standards match capabilities closely, even when the capabilities are limited. In this way, all participants in the system security process will have more confidence in analysis and requirements.
  • 14. Chapter 1: Introduction – Cont. • Decision makers need to understand precisely what protections can be put into place and have a good understanding of any residual, unprotected risks that remain. • A suite of controls implemented for a system becomes that system’s defense. If well designed, these become a “defense-in-depth,” a set of overlapping and somewhat redundant controls. Because, of course, things fail. One security “principle” is that no single control can be counted upon to be inviolable. Everything may fail. Single points of failure are potentially vulnerable. Chapter 1: Introduction – Cont. • The Open Web Application Security Project (OWASP) provides a distillation of several of the most well known sets of computer security principles: • Apply defense-in-depth (complete mediation). • Use a positive security model (fail-safe defaults, minimize attack surface). • Fail securely. • Run with least privilege. • Avoid security by obscurity (open design). • Keep security simple (verifiable, economy of mechanism). • Detect intrusions (compromise recording). • Don’t trust infrastructure.
  • 15. • Establish secure defaults. Chapter 1: Introduction – Cont. • 1.3 Applying Security to Any System • A typical progression of security maturity is to start by building one-off security features into systems during system implementation. During the early periods, there may be only one critical system that has any security requirements! It will be easier and cheaper to simply build the required security services as a part of the system as it’s being implemented. As time goes on, perhaps as business expands into new territories or different products, there will be a need for common architectures, if for no other reason than maintainability and shared cost. It is typically at this point that a security infrastructure comes into being that supports at least some of the common security needs for many systems to consume. It is characteristically a virtue to keep complexity to a minimum and to reap scales of economy. Chapter 1: Introduction – Cont. • Almost every type and size of a system will have some security needs. Although it may be argued that a throw-away utility, written to solve a singular problem, might not have any security needs, if that utility finds a useful place
  • 16. beyond its original problem scope, the utility is likely to develop security needs at some point. • Complex business systems typically have security requirements up front. In addition, either the implementing organization or the users of the system or both will have security expectations of the system. But complexity is not the determiner of security. • Thus, the answer as to whether a system requires an ARA and threat model is tied to the answers to a number of key questions: • What is the expected deployment model? • What will be the distribution? • What language and execution environment will run the Chapter 1: Introduction – Cont. • Size, business criticality, expenses, and complexity, among others, are dimensions that may have a bearing, but are not solely deterministic. I have seen many Enterprise IT efforts fail, simply because there was an attempt to reduce this early decision to a two-dimensional space, yes/no questions. These simplifications invariably attempted to achieve efficiencies at scale. Unfortunately, in practice today, the decision to analyze the architecture of a system for security is a complex, multivariate problem.
  • 17. • The answer to “Systems? Which systems?” cannot be overly simplified. Depending upon use cases and intentions, analyzing almost any system may produce significant security return on time invested. And, concomitantly, in a world of limited resources, some systems and, certainly, certain types of system changes may be passed without review. The organization may be willing to accept a certain amount of unknown risk asa result of not conducting a review. Chapter 1: Summary Information assurance is achieved when information and information systems are protected against attacks through the application of security services such as availability, integrity, authentication, confidentiality, and nonrepudiation. The application of these services should be based on the protect, detect, and react paradigm. • This means that in addition to incorporating protection mechanisms, organizations need to expect attacks and include attack detection tools and procedures that allow them to react to and recover from these unexpected attacks. University of the Cumberlands�School of Computer & Information Sciences��WelcomeChapter 1: Introduction Chapter 1: Introduction – Cont. Chapter 1: Introduction – Cont. Chapter 1: Introduction – Cont. Chapter 1: Introduction – Cont. Chapter 1: Introduction – Cont. Chapter 1: Introduction – Cont.
  • 18. Chapter 1: Introduction – Cont. Chapter 1: Introduction – Cont. Chapter 1: Summary In this week's discussion, I watched a session on the theory of cognitive therapy. In this session, the client had worked with the therapist about how they feel uncomfortable in a group setting, and are having a hard time in the group discussion. During the session, there was one automatic thought that stood out to me. The client recalled about a class that she has, and an inclusion activity that she was required to participate in it. The client said, “I know it is called an inclusion activity, but it feels the opposite for me”(Flanagan, Flanagan Retrieved 2020 ). When she brought up this mental event, she simply stated how she felt about the event without processing the outcomes of it. The other automatic thought that I observed while watching the session is when the client brought up her friend in the session. This is a positive automatic thought when I observed it. As the therapist continued with the session, the client said: “I just want to be a helpful person with my friend” (Flanagan, Flanagan Retrieved 2020 ). When the client said this, it was a way that she remembered the time and situation that she could be of helpfulness to her friend. When we talk about the topic of cognitive distortions, I saw one of the distortions specifically throughout the whole session. The one distortion that I saw, was the concept of selective abstraction (Corey 2017). What this means is that you come to conclusions based on only part of the information. When you come to these conclusions, they can sometimes focus mostly on the weaknesses and not the successes (Corey 2017). This is the client talking about themselves. In the video, the client talks about how they are just wanting to be heard and how they think that they are unable to speak and they would not say the correct things when they finally get the courage to speak as well. The counselor also used a multi-column worksheet, that I liked. In my opinion, it was a way that you could understand different
  • 19. issues that could be bothering the client and how they link together without making that connection firsthand. The counselor made the connection, as the session went on. It happened organically which I liked as a whole. As I was watching the session unfold, I liked the cognitive theory. For me, it is a good balance of control between the counselor and the client. I think that having an agenda through the session is a good idea and even better when the client makes the agenda with you. This type of theory requires more of a counselor driven aspect and has more responsibility that needs to come from the counselor. This makes me comfortable because while there is an agenda, we do not always have to touch on every aspect. It is a flexible session, because you may discover new complications that could not be on the agenda that the client may have not thought were issues. That is why driving the session is important for the counselor. Automatic thoughts are the negative thoughts that a person has about themselves or a situation. These thoughts need to be challenged with evidence to either support or deny their accuracy. When the evidence does not support the thought, a new alternative is introduced. However, if the automatic thought is supported by evidence, the counselor can help the client come up with an action plan to solve the problem (Corey, 2017). In the video, Meredith thinks several negative things about herself during the activity in her stats class. She asks herself, "Oh God, what am I going to say?" and "Why can't I be articulate?" She also tells herself, "I never feel comfortable." and "What I say doesn't matter much." Cognitive distortions are errors in interpretation of our cognitions (Corey, 2017). In the video, Meredith displayed dichotomous thinking. She perceived that she was "never" able to be clever or respond appropriately during the activity in her stats class. With the help of the counselor, she was able to
  • 20. realize that she did see situations as either black or white, the extremes. At first, she was unable to recognize that she was a "clever" storyteller sometimes. Her use of the word "never" when saying how comfortable she was in groups also shows that she is focused on the extremes. I think the use of a multi column worksheet can be helpful for both the counselor and the client if it is shared with them. It is a great way to organize what the client is saying and can also help clarify or categorize the client's thoughts as helpful or unhelpful (Sommers-Flanagan, 2012, 2:41:46). Having the thoughts written down can also show the client how distorted they are. Sometimes, when someone sees something in writing, he or she realizes that what they are thinking is not rational. They can also see patterns such as how often they use words such as "always" or "never." I think that this approach has a lot of value with some clients. Some clients may enter into therapy in such a state of crisis, that they need the counselor to be more directive. Sometimes clients may have an additional diagnosis that makes it hard for them to process information. For example, individuals with autism, often see things in concrete terms. They could benefit from a counselor taking the lead and helping them reframe their thoughts. I am somewhat comfortable with this approach because I see the effectiveness of it. In order for my comfort level to increase, I need to be able to practice it and see examples of how it is used with children. Corey, G. (2017). Theory and practice of counseling and psychotherapy (10th ed.). Boston, MA: Cengage Learning. Sommers-Flanagan, J., & Sommers-Flanagan, R. (2012). Counseling and psychotherapy theories in context and practice [Video]. Available from psychotherapy.net/.bridges.searchmobius.org/stream/mobap/vid eo?vid=277 Reply
  • 21. 63727_fm_rev02.indd 6 18/09/15 11:54 AM www.acetxt.com Engaged with you. www.cengage.com Source Code: 14M-AA0105 Tap into engagement MindTap empowers you to produce your best work— consistently. MindTap is designed to help you master the material. Interactive videos, animations, and activities create a learning path designed by your instructor to guide you through the course and focus on what’s important. Tap into more info at: www.cengage.com/mindtap “MindTap was very useful – it was easy to follow and everything was right there.” — Student, San Jose State University “I’m definitely more engaged because of MindTap.” — Student, University of Central Florida “MindTap puts practice questions in a format that works well
  • 22. for me.” — Student, Franciscan University of Steubenville MindTap helps you stay organized and efficient by giving you the study tools to master the material. MindTap empowers and motivates with information that shows where you stand at all times—both individually and compared to the highest performers in class. MindTap delivers real-world activities and assignments that will help you in your academic life as well as your career. Flashcards readspeaker progress app MyNotes & highlights selF QuizziNg & practice 63727_Insert 2_ptg01_hr.indd 1 05/10/15 2:10 PM Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
  • 23. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. www.acetxt.com Theories at-a-Glance The tables in this book compare theories over a range of topics, thereby providing you with the ability to easily compare, contrast, and grasp the practical aspects of each theory. These tables also serve as invaluable resources that can be used to review the key concepts, philoso- phies, limitations, contributions to multicultural counseling, applications, techniques, and goals of all theories in this text. The following chart provides a convenient guide to the tables in this text. Pages 6 –7 Table 1.1 Overview of Contemporary Counseling Models 62– 63 Table 4.1 Ego-Defense Mechanisms 65– 66 Table 4.2 Comparison of Freud’s Psychosexual Stages and Erikson’s Psychosocial Stages 432 Table 15.1 The Basic Philosophies 433– 434 Table 15.2 Key Concepts
  • 24. 438 Table 15.3 Goals of Therapy 441– 442 Table 15.4 The Therapeutic Relationship 443– 444 Table 15.5 Techniques of Therapy 444– 445 Table 15.6 Applications of the Approaches 446 Table 15.7 Contributions to Multicultural Counseling 447 Table 15.8 Limitations in Multicultural Counseling 448– 449 Table 15.9 Contributions of the Approaches 449– 450 Table 15.10 Limitations of the Approaches 63727_Insert 3_ptg01_hr.indd 1 30/09/15 10:13 AM Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. www.acetxt.com Overview of Focus Questions for the Theories For the chapters dealing with the different theories, you will have a basic understand- ing of this book if you can answer the following questions as
  • 25. they apply to each of the eleven theories: Who are the key figures (founder or founders) associated with the approach? What are some of the basic assumptions underlying this approach? What are a few of the key concepts that are essential to this theory? What do you consider to be the most important goals of this therapy? What is the role the therapeutic relationship plays in terms of therapy outcomes? What are a few of the techniques from this therapy model that you would want to incorporate into your counseling practice? What are some of the ways that this theory is applied to client populations, settings, and treat- ment of problems? What do you see as the major strength of this theory from a diversity perspective? What do you see as the major shortcoming of this theory from a diversity perspective? What do you consider to be the most significant contribution of this approach? What do you consider to be the most significant limitation of
  • 26. this approach? 63727_Insert 3_ptg01_hr.indd 2 30/09/15 10:13 AM Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. www.acetxt.com Australia • Brazil • Mexico • Singapore • United Kingdom • United States Gerald Corey California State University, Fullerton Diplomate in Counseling Psychology, American Board of Professional Psychology Theory and PracTice of counseling and PsychoTheraPy Tenth Edition 63727_fm_rev02.indd 1 20/10/15 10:25 AM Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due
  • 27. to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. www.acetxt.com 63727_fm_rev02.indd 6 18/09/15 11:54 AM This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for materials in your areas of interest. Important Notice: Media content referenced within the product description or the product text may not be available in the eBook version. Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does
  • 28. not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. www.acetxt.com Printed in the United States of America Print Number: 01 Print Year: 2015 © 2017, 2013, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. Theory and Practice of Counseling and Psychotherapy, Tenth Edition Gerald Corey Product Director: Jon David Hague
  • 29. Product Manager: Julie Martinez Content Developer: Kyra Kane Product Assistant: Stephen Lagos Marketing Manager: Margaux Cameron Content Project Manager: Rita Jaramillo Art Director: Vernon Boes Manufacturing Planner: Judy Inouye Production Service: Cenveo® Publisher Services Text and Cover Designer: Cheryl Carrington Cover Image: ©Purestock/Getty Images Compositor: Cenveo® Publisher Services For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706. For permission to use material from this text or product, submit all requests online at www.cengage.com/permissions. Further permissions questions can be e-mailed to [email protected] Library of Congress Control Number: 2015948206 Student Edition: ISBN: 10- 1305263727
  • 30. Loose-leaf Edition: ISBN: 978-1-305-26372-7 Cengage Learning 20 Channel Center Street Boston, MA 02210 USA Cengage Learning is a leading provider of customized learning solutions with employees residing in nearly 40 different countries and sales in more than 125 countries around the world. Find your local representative at www.cengage.com. Cengage Learning products are represented in Canada by Nelson Education, Ltd. To learn more about Cengage Learning Solution s, visit www.cengage.com. Purchase any of our products at your local college store or at our preferred online store www.cengagebrain.com. 63727_fm_rev02.indd 2 18/09/15 11:54 AM
  • 31. WCN: 02-200-203 Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. www.acetxt.com To the founders and key figures of the theories presented in this book—with appreciation for their contributions to contemporary counseling practice. 63727_fm_rev02.indd 3 18/09/15 11:54 AM Copyright 2017 Cengage Learning. All Rights Reserved. May
  • 32. not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. www.acetxt.com iv abouT The auThor gerald corey is Professor Emeritus of Human Services and Counseling at California State University at Fullerton. He received his doctorate in counseling from the University of Southern California. He is a Diplomate in Counseling Psy- chology, American Board of Professional Psychology; a licensed psychologist; and a National Certified Counselor. He is a Fellow of the American
  • 33. Psychological Associa- tion (Division 17, Counseling Psychology; and Division 49, Group Psychotherapy); a Fellow of the American Counseling Association; and a Fellow of the Association for Specialists in Group Work. He also holds memberships in the American Group Psychotherapy Association; the American Mental Health Counselors Association; the Association for Spiritual, Ethical, and Religious Values in Counseling; the Asso- ciation for Counselor Education and Supervision; and the Western Association of Counselor Education and Supervision. Both Jerry and Marianne Corey received the Lifetime Achievement Award from the American Mental Health Counselors Associ- ation in 2011, and both of them received the Eminent Career Award from ASGW in 2001. Jerry was given the Outstanding Professor of the Year Award from California State University at Fullerton in 1991. He regularly teaches both undergraduate and graduate courses in group counseling and ethics in counseling. He is the author or
  • 34. coauthor of 15 textbooks in counseling currently in print, along with more than 60 journal articles and book chapters. Several of his books have been translated into other languages. Theory and Practice of Counseling and Psychotherapy has been trans- lated into Arabic, Indonesian, Portuguese, Turkish, Korean, and Chinese. Theory and Practice of Group Counseling has been translated into Korean, Chinese, Spanish, and Russian. Issues and Ethics in the Helping Professions has been translated into Korean, Japanese, and Chinese. In the past 40 years Jerry and Marianne Corey have conducted group counsel- ing training workshops for mental health professionals at many universities in the United States as well as in Canada, Mexico, China, Hong Kong, Korea, Germany, Belgium, Scotland, England, and Ireland. In his leisure time, Jerry likes to travel, hike and bicycle in the mountains, and drive his 1931 Model A Ford. Marianne and Jerry have been married since 1964. They have two adult
  • 35. daughters, Heidi and Cindy, two granddaughters (Kyla and Keegan), and one grandson (Corey). Recent publications by Jerry Corey, all with Cengage Learning, include: �� Theory and Practice of Group Counseling, Ninth Edition (and Student Manual) (2016) �� Becoming a Helper, Seventh Edition (2016, with Marianne Schneider Corey) �� Issues and Ethics in the Helping Professions, Ninth Edition (2015, with Mari- anne Schneider Corey, Cindy Corey, and Patrick Callanan) �� Group Techniques, Fourth Edition (2015, with Marianne Schneider Corey, Patrick Callanan, and J. Michael Russell) �� Groups: Process and Practice, Ninth Edition (2014, with Marianne Schnei-
  • 36. der Corey and Cindy Corey) iv 63727_fm_rev02.indd 4 18/09/15 11:54 AM Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. www.acetxt.com v �� I Never Knew I Had a Choice, Tenth Edition (2014, with Marianne Schneider Corey)
  • 37. �� Case Approach to Counseling and Psychotherapy, Eighth Edition (2013) �� The Art of Integrative Counseling, Third Edition (2013) Jerry Corey is coauthor (with Barbara Herlihy) of Boundary Issues in Counseling: Multiple Roles and Responsibilities, Third Edition (2015) and ACA Ethical Standards Case- book, Seventh Edition (2015); he is coauthor (with Robert Haynes, Patrice Moulton, and Michelle Muratori) of Clinical Supervision in the Helping Professions: A Practical Guide, Second Edition (2010); he is the author of Creating Your Professional Path: Les- sons From My Journey (2010). All four of these books are published by the American Counseling Association. He has also made several educational DVD programs on various aspects of counseling practice: (1) Ethics in Action: DVD and Workbook (2015, with Marianne Schneider Corey and Robert Haynes); (2) Groups in Action: Evolution and Challenges DVD and Workbook (2014, with Marianne Schneider Corey and
  • 38. Robert Haynes); (3) DVD for Theory and Practice of Counseling and Psychotherapy: The Case of Stan and Lecturettes (2013); (4) DVD for Integrative Counseling: The Case of Ruth and Lecturettes (2013, with Robert Haynes); and (5) DVD for Theory and Practice of Group Counseling (2012). All of these programs are available through Cengage Learning. 63727_fm_rev02.indd 5 18/09/15 11:54 AM Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. www.acetxt.com 63727_fm_rev02.indd 6 18/09/15 11:54 AM
  • 39. Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. Preface xi P A R T 1 BASIC ISSUES IN COUNSELING PRACTICE 1 Introduction and Overview 1 introduction 2 Where I Stand 3 Suggestions for Using the Book 5 Overview of the Theory Chapters 6 Introduction to the Case of Stan 9
  • 40. Introduction to the Case of Gwen 13 2 The Counselor: Person and Professional 17 introduction 18 The Counselor as a Therapeutic Person 18 Personal Therapy for the Counselor 20 The Counselor’s Values and the Therapeutic Process 22 Becoming an Effective Multicultural Counselor 25 Issues Faced by Beginning Therapists 28 Summary 35 3 Ethical Issues in Counseling Practice 37 introduction 38 Putting Clients’ Needs Before Your Own 38 Ethical Decision Making 39 The Right of Informed Consent 41 Dimensions of Confidentiality 42 Ethical Issues From a Multicultural Perspective 43 Ethical Issues in the Assessment Process 45 Ethical Aspects of Evidence-Based Practice 48 Managing Multiple Relationships in Counseling
  • 41. Practice 49 Becoming an Ethical Counselor 52 Summary 53 Where to Go From Here 53 Recommended Supplementary Readings for Part 1 54 P A R T 2 THEORIES AND TECHNIQUES OF COUNSELING 4 Psychoanalytic Therapy 57 introduction 58 Key Concepts 59 The Therapeutic Process 66 Application: Therapeutic Techniques and Procedures 72 Jung’s Perspective on the Development of Personality 77 Contemporary Trends: Object-Relations Theory, Self Psychology, and Relational Psychoanalysis 79 Psychoanalytic Therapy From a Multicultural
  • 42. Perspective 84 Psychoanalytic Therapy applied to the case of stan 85 Psychoanalytic Therapy applied to the case of gwen 87 Summary and Evaluation 89 Self-Reflection and Discussion Questions 92 Where to Go From Here 92 Recommended Supplementary Readings 93 5 Adlerian Therapy 95 introduction 98 Key Concepts 98 The Therapeutic Process 104 Application: Therapeutic Techniques and Procedures 108 Adlerian Therapy From a Multicultural Perspective 119 adlerian Therapy applied to the case of stan 121 adlerian Therapy applied to the case of gwen 122 Contents vii
  • 43. 63727_fm_rev02.indd 7 18/09/15 11:54 AM Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. viii C o n t e n t s Summary and Evaluation 124 Self-Reflection and Discussion Questions 126 Where to Go From Here 127 Recommended Supplementary Readings 128 6 Existential Therapy 129 introduction 132 Key Concepts 137 The Therapeutic Process 146 Application: Therapeutic Techniques and
  • 44. Procedures 149 Existential Therapy From a Multicultural Perspective 153 existential Therapy applied to the case of stan 155 existential Therapy applied to the case of gwen 156 Summary and Evaluation 157 Self-Reflection and Discussion Questions 160 Where to Go From Here 160 Recommended Supplementary Readings 162 7 Person-Centered Therapy 163 introduction 165 Key Concepts 170 The Therapeutic Process 171 Application: Therapeutic Techniques and Procedures 176 Person-Centered Expressive Arts Therapy 180 Motivational Interviewing 182 Person-Centered Therapy From a Multicultural Perspective 184 Person-centered Therapy applied to the case of stan 186
  • 45. Person-centered Therapy applied to the case of gwen 187 Summary and Evaluation 190 Self-Reflection and Discussion Questions 193 Where to Go From Here 193 Recommended Supplementary Readings 195 8 Gestalt Therapy 197 introduction 199 Key Concepts 200 The Therapeutic Process 206 Application: Therapeutic Techniques and Procedures 211 Gestalt Therapy From a Multicultural Perspective 220 gestalt Therapy applied to the case of stan 221 gestalt Therapy applied to the case of gwen 223 Summary and Evaluation 224 Self-Reflection and Discussion Questions 227 Where to Go From Here 227 Recommended Supplementary Readings 229 9 Behavior Therapy 231 introduction 233
  • 46. Key Concepts 236 The Therapeutic Process 238 Application: Therapeutic Techniques and Procedures 240 Behavior Therapy From a Multicultural Perspective 258 behavior Therapy applied to the case of stan 259 behavior Therapy applied to the case of gwen 260 Summary and Evaluation 262 Self-Reflection and Discussion Questions 265 Where to Go From Here 266 Recommended Supplementary Readings 267 10 Cognitive Behavior Therapy 269 introduction 270 Albert Ellis’s Rational Emotive Behavior Therapy 270 Key Concepts 272 The Therapeutic Process 273 Application: Therapeutic Techniques and Procedures 275 Aaron Beck’s Cognitive Therapy 281 Christine Padesky and Kathleen Mooney’s Strengths-Based Cognitive Behavioral Therapy 289 Donald Meichenbaum’s Cognitive Behavior
  • 47. Modification 293 Cognitive Behavior Therapy From a Multicultural Perspective 298 cognitive behavior Therapy applied to the case of stan 300 cognitive behavior Therapy applied to the case of gwen 302 Summary and Evaluation 303 63727_fm_rev02.indd 8 18/09/15 11:54 AM Copyright 2017 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s). Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it. C o n t e n t s ix Self-Reflection and Discussion Questions 307
  • 48. Where to Go From Here 308 Recommended Supplementary Readings 310 11 Choice Theory/Reality Therapy 311 introduction 313 Key Concepts 314 The Therapeutic Process 318 Application: Therapeutic Techniques and Procedures 320 Choice Theory/Reality Therapy From a Multicultural Perspective 327 reality Therapy applied to the case of stan 329 reality Therapy applied to the case of gwen 331 Summary and Evaluation 332 Self-Reflection and Discussion Questions 334 Where to Go From Here 334 Recommended Supplementary Readings 336 12 Feminist Therapy 337 introduction 339 Key Concepts 341 The Therapeutic Process 345 Application: Therapeutic Techniques and
  • 49. Procedures 348 Feminist Therapy From a Multicultural and Social Justice Perspective 354 feminist Therapy applied to the case of stan 355 feminist Therapy applied to the case of gwen 357 Summary and Evaluation 360 Self-Reflection and Discussion Questions 364 Where to Go From Here 364 Recommended Supplementary Readings 366 13 Postmodern Approaches 367 Some Contemporary Founders of Postmodern Therapies 368 Introduction to Social Constructionism 368