26 julio, 2024

3 computer security models | Bootcamps

Do you know what computer security models are, how they differ and how they can be combined? In this post we explain it to you!

What are computer security models?

In this article, we will see three different models of computer security. However, in reality, the third is about the mixture of the first two. For this reason, we will also talk about when and how it is useful to use or combine each of these cybersecurity models.

Next, we will explain to you what the three models of computer security that exist and how they are usually applied.

3 computer security models

The three computer security models are based on the fact that Access to services and information is permitted or prohibited. These are:

Whitelisting or positive security.
Blacklisting or negative security.
Whitelisting + Blacklisting.

Whitelisting

He whitelisting or positive security is a computer security model that is based on allowing authorized users to access data in a system. He whitelisting It is used both in networks and in devices and in all types of software and applications. The best example to talk about computer security models of whitelisting is the use of login credentials.

Our credentials (or rather their hash codes) are whitelisted in the databases of the software what do we use. That’s why, computer security models whitelisting They could be much more common than you think.

Blacklisting

There is another approach to managing user access to information. From the perspective of blacklisting or negative security, you want to block certain users, which are related to improper or threatening actions. He blacklisting It is a form of threat prevention that protects our systems from interacting with certain malicious agents that are present on the network.

Mixed security

Mixed computer security models are based on combining the use of whitelists with the use of blacklists. This is especially seen in the configuration of web servers. These have a whitelist of registered users, authorized to use the services, while, at the same time, they must block certain threatening IP addresses.

How to learn more?

If you want to know more about what computer security models are and how they are appliedenter our Cybersecurity Full Stack Bootcamp and become a specialist in just 7 months. Don’t keep waiting to change your life and sign up now!

Deja una respuesta

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *