Video Description

We continue our discussion about Access Controls by examining Access Control Technologies and how they support each of the three Access Control Models. You'll also learn about Rules based access controls, Constrained User Interfaces and the Clark-Wilson Security Model and how the interface is used to access trusted resources.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring