These models are mainly used for Defense Purpose i.e., securing the data or the asset.
There are 2 main types of Security Defense Models: Lollipop Model, and Onion Model. These are explained as following below.
1. Lollipop Model :
Lollipop Model is Defense Model associated with an analogy of a Lollipop. A lollipop is having a chocolate in the middle and around the chocolate, there is a layer of crust, mainly of sugar flavored syrup. A person licks and licks the lollipop and finally, the chocolate in the middle is exposed.
Mapping this analogy of Lollipop to the Model, as shown in the above diagram, the hacker just needs to break that one layer of security to get hands on the asset, in this case, say it is Username and Password. Once it is done, the hacker can access the asset. So Lollipop Model is not a good model for Network Security.
2. Onion Model :
Onion Model is Defense Model associated with an analogy of an Onion. An Onion is a vegetable which is composed of layers. Only by peeling each layer, we can get to the center of the Onion. Also, while peeling, we get tears in our eyes.
Mapping this analogy of Onion to the Model, as shown in the above diagram, the hacker needs to break all the layers of security to get access to the asset. Breaking each layer i.e., Firewall, IDS/IPS, Authentication, Authorisation, and Cryptography in this case, should bring tears to his eyes. In simple words, breaking each layer should be complex and extremely challenging for the hacker. So Onion Model is considered as a good model for Network Security.
Attention reader! Don’t stop learning now. Get hold of all the important DSA concepts with the DSA Self Paced Course at a student-friendly price and become industry ready.
- Difference between Information Security and Network Security
- Difference between Cyber Security and Information Security
- Difference between Network Security and Cyber Security
- OSI, TCP/IP and Hybrid models
- Security of RSA
- Network Security
- Data Security
- Need Of Information Security
- What is Information Security?
- IP security (IPSec)
- System Security
- Is SSL enough for Cloud Security?
- Wireless Security | Set 1
- Cyber System Security
- Wireless Security | Part 2
- Computer Security and its Challenges
- Threats to Information Security
- Vulnerabilities in Information Security
- Security Operations Center (SOC)
- Availability in Information Security
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.