Please enable JavaScript.
Coggle requires JavaScript to display documents.
SECURITY MODEL (CLOSED SECURITY MODEL (Most difficult to implement, All…
SECURITY MODEL
CLOSED SECURITY MODEL
-
-
-
all users are not trustworthy, and that threats are frequent
-
-
-
Open Security Model
-
-
protected assets are minimal, user are trusted, and threats are minimal
-
Example: hardware (router, switch)
-