- easy to implement
- few security measures
- simple password
- assume all users are trusted protected asset minimal and threat are minimal.
- free access for user
- implement data backup system in most case.
RESTRICTIVE SECURITY MODEL
- More difficult to implement
- more security measures
- firewall and identity server.
- some user are not trustworthy , protected asset are substantial and threat are likely to occur
- LAN that connected to WAN or internet usually use this type of model.
CLOSED SECURITY MODEL
- most difficult to implement
- all security measures
- assume all user are not trustworthy, protected asset are premium
- user access is difficult
- organization require high number and trained network admin to maintain tight security
- network admin need to have high skills and more time to administer
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
SECURITY METHOD
- log on - log on form
- File system - can access only certain file + encrypt data along transmission
- Data Communication -encryption confidential data
- Administrative -different level user have different privilege access + admin define the rules.
No comments:
Post a Comment