This paper introduces some practical security models and their actions and characteristics. Based on the analysis of office network data flow we lay stress on the arboreous security state machine model which befits the office network of army or government.