Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.1 Introduction to Computer network System (e)Closed Security Models…
1.1 Introduction to Computer network System
a) The need for network security
Prevent unauthorized access to the network that is of potential threat to the network and its resources
Ensure that the authentic users can effectively access the network and its services
b)Requirements of network security
c) Open security Models
The easiest to implement
Suitable for LANs/ public WANs that are not connected to the Internet
Example : (router,switch)
d)Restrictive Security Models
More difficult to implement
Firewall and identify servers become the foundation of this model
Suitable for LANs/ public WANs that connect to the Internet
e)Closed Security Models
Most Difficult to implement
Users access is difficult and cumbersome
Example : Hardware (firewall)
Need many train network administrator to maintain the tight security applied
f) Legal Issues and Privacy Concerns
In businesses , one of the biggest reasons to create and follow a security policy is compliance with the law
Legal liability in such cases is likely to depend on what prevention technologies and practices are available and on whether these technologies and practices are reasonably cost-effective to implement