Different models of network security cater to varying needs and levels of trust among users. The restrictive model, which relies on firewalls and identity servers, is suitable for environments with substantial assets and untrusted users, though it can be challenging to implement and reduces ease of use.