类别 全部 - security - assets - implementation - closed

作者:nik fazli 5 年以前

258

SECURITY MODEL

Different models of network security cater to varying needs and levels of trust among users. The restrictive model, which relies on firewalls and identity servers, is suitable for environments with substantial assets and untrusted users, though it can be challenging to implement and reduces ease of use.

SECURITY MODEL

SECURITY MODEL

OPEN MODEL

Example: hardware (router,switch)
Suitable for LANs /public WANs that are not connected to the Internet
protected assets are minimal,user are trusted and threars are minimal
simple password
The easiest implement

CLOSED MODEL

Example : hardware (firewall)
protect assets are premium
all users are not trustworthy and that threars are frequent
all available security measures
Most difficult to implement
user access is difficult and cumbersome
need many train network administrator

RESTRICTIVE MODEL

ease of use for users diminishes as security tightens
suitable for LANs / public WANs
protected assets are substantial, some users are not trustworthy
firewalls and identity servers become the foundation of this model
More difficult to implement