Video Description

In Part 3 we discuss Access Control Models and how their design is regulated to determine what subject can do to an object can do and how. You'll also learn what the three Access control models are, how they are supported, how object ownership is determined, and how access permissions are granted.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring