Video Description

For this section, we continue our discussion on Access Controls enforcement with a distinction between context-based and content-based access control then correlate that to how it's accessed. We also discuss at length centralized administrative controls, and review what advantages and disadvantages it has for security policy development and management. For example, we examine RADIUS and discuss how its centralized administrative infrastructure is configured, the user population it supports, and what security and access control shortcomings it may present.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring