Foundations of Computer and Information Security. This covers integrity and information flow, some examples, and the confinement problem. The class starts at 3:15 into the video.
Foundations of Computer and Information Security. This covers network flooding attacks anf the Chinese Wall model. The class starts at 7:37 into the video.
Foundations of Computer and Information Security. This covers state-based availability models and some defenses against network flooding attacks. The class starts at 8:56 into the video.