Watch this video on YouTube
The Computer Security Policy Model the Orange Book is based on is which of the following?