| Scope of users |
Public – anyone worldwide |
Private – employees and authorised internal staff |
Restricted – internal staff plus selected external parties |
| Access control |
None (open) – security relies on individual sites |
Strong – firewalls, authentication, internal policies |
Strong – VPN, firewalls, user‑level permissions |
| Typical uses |
Web browsing, email, social media, cloud services |
Internal portals, HR systems, file servers, internal email |
Supplier portals, customer support sites, joint project spaces |
| Network infrastructure |
Public service providers, backbone routers, DNS |
Organisation’s LAN/WAN, internal routers, private DNS |
Organisation’s LAN/WAN plus secure gateway to external users |
| Security concerns |
High – exposure to malware, phishing, DDoS |
Medium – internal threats, insider misuse |
Medium‑high – need to protect internal data while allowing external access |
| Cost of implementation |
Low for end‑user (subscription); high for providers |
Moderate – hardware, software, maintenance |
Higher – additional security devices, VPN licences, monitoring |