Wednesday, April 13, 2011

F5108 -CHAPTER 1 -cont SECURITY MODEL

OPEN SECURITY MODEL

  • easy to implement
  • few security measures
  • simple password
  • assume all users are trusted protected asset minimal and threat are minimal.
  • free access for user
  • implement data backup system in most case.

RESTRICTIVE SECURITY MODEL

  • More difficult to implement
  • more security measures
  • firewall and identity server.
  • some user are not trustworthy , protected asset are substantial and threat are likely to occur
  • LAN that connected to WAN or internet usually use this type of model.

CLOSED SECURITY MODEL

  • most difficult to implement
  • all security measures
  • assume all user are not trustworthy, protected asset are premium
  • user access is difficult
  • organization require high number and trained network admin to maintain tight security
  • network admin need to have high skills and more time to administer

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

SECURITY METHOD


  • log on - log on form
  • File system - can access only certain file + encrypt data along transmission
  • Data Communication -encryption confidential data
  • Administrative -different level user have different privilege access + admin define the rules.


No comments:

Post a Comment