In this lecture I am going to elaborate the following areas:
- Chapter 1 we briefly evaluated the Security Controls (Administrative, Technical and Physical) and now lets discuss with respect to implementation of these Security Controls.
- Next, lets discuss this week discussion topic: Elevation of Privileges
- Finally, I am going to go over the Chaper2: Strategies for Threat Modeling
- Please open the Access Control Implementation Model.pdf