Watch this video on YouTube
Which of the following access control models is characterized by the lowest degree of security?