SECURITY MODEL
RESTRICTIVE MODEL
More difficult to implement
firewalls and identity servers become the foundation of this model
protected assets are substantial, some users are not trustworthy
suitable for LANs / public WANs
ease of use for users diminishes as security tightens
CLOSED MODEL
need many train network administrator
user access is difficult and cumbersome
Most difficult to implement
all available security measures
all users are not trustworthy and that threars are frequent
protect assets are premium
Example : hardware (firewall)
OPEN MODEL
The easiest implement
simple password
protected assets are minimal,user are trusted and threars are minimal
Suitable for LANs /public WANs that are not connected to the Internet
Example: hardware (router,switch)