Sunday, March 24, 2019
Security and the OSI Model Essay -- Networks Telecommunications
purloin The Open Systems Interconnect (OSI) personate is a standard reference put for the communication between two fetch up officers. Seven contrasting social classs gather in up the OSI model sensual, information link, earnings, transport, session, presentation, and application program. This account will cover the slip of auspices that is associated with each train of the OSI model. corporal LayerThe physical stage is where the literal communication glide bys between devices. The guarantor of the physical socio-economic class pertains to the actual hardw ar. The vulnerabilities of the physical forge include military force outageEnvironmental ascendency deviationHardware theft, damage or demolitionUnauthorized hardware changes (i.e. extractable media, data connections)Detachment of the physical data linksUnnoticeable data InterceptionKeystroke LoggingCertain measures can be implemented to ensure the physical layer is secure. This would be done by sto ring all hardware in a locked environment. The use of electronic locks would control and log all plan of attack to the room containing the hardware. The electronic locks could be a PIN and password or fingerprint scanner (biometrics). The use of impression and audio surveillance would support physical proof of unauthorized adit that could compromise the hardware.Data marry LayerThe second layer of the OSI model is the data link layer. This is the layer that transports the data between network nodes in a wide neighborhood network (WAN) or on the akin local area network (LAN) between nodes. The data link layer makes available the procedural and available means to move data between network devices and could provide the measures to welcome and possibly correct errors that may occur in the physical layer. The security vulnerabi... ...on. This is to stop any unauthorized use of the network.ConclusionIn conclusion, the tuition covered in this paper shows the antithetic types of security that is associated with each level of the standard OSI model. From the physical layer to the application layer, each layer has a different type of security which mustiness be applied at each layer to prevent any security leaks, spoofing, and infinite loops. These are just a few of the different vulnerabilities that must be protected on a WLAN or LAN. ReferencesReed (November 21, 2003). Applying the OSI seven layer model to Information credential. Retrieved on January 11, 2008, from SANS Institute. Website http//www.sans.org/reading_room/whitepapers/protocols/1309.phpHaden (2008). The OSI Model. Retrieved on January 11, 2008, from Data Network Resource. Website http//www.rhyshaden.com/osi.htm Security and the OSI Model Essay -- Networks TelecommunicationsAbstract The Open Systems Interconnect (OSI) model is a standard reference model for the communication between two end users. Seven different layers make up the OSI model physical, data link, network, transport, session, presentation, and application. This paper will cover the type of security that is associated with each level of the OSI model.Physical LayerThe physical layer is where the actual communication occurs between devices. The security of the physical layer pertains to the actual hardware. The vulnerabilities of the physical layer includePower outageEnvironmental control lossHardware theft, damage or destructionUnauthorized hardware changes (i.e. removable media, data connections)Detachment of the physical data linksUnnoticeable Data InterceptionKeystroke LoggingCertain measures can be implemented to ensure the physical layer is secure. This would be done by storing all hardware in a locked environment. The use of electronic locks would control and log all access to the room containing the hardware. The electronic locks could be a PIN and password or fingerprint scanner (biometrics). The use of video and audio surveillance would provide physical proof of unauthorized access that could compromise the hardware.Data Link LayerThe second layer of the OSI model is the data link layer. This is the layer that transports the data between network nodes in a wide area network (WAN) or on the same local area network (LAN) between nodes. The data link layer makes available the procedural and functional means to move data between network devices and could provide the measures to find and possibly correct errors that may occur in the physical layer. The security vulnerabi... ...on. This is to stop any unauthorized use of the network.ConclusionIn conclusion, the information covered in this paper shows the different types of security that is associated with each level of the standard OSI model. From the physical layer to the application layer, each layer has a different type of security which must be applied at each layer to prevent any security leaks, spoofing, and infinite loops. These are just a few of the different vulnerabilit ies that must be protected on a WLAN or LAN. ReferencesReed (November 21, 2003). Applying the OSI seven layer model to Information Security. Retrieved on January 11, 2008, from SANS Institute. Website http//www.sans.org/reading_room/whitepapers/protocols/1309.phpHaden (2008). The OSI Model. Retrieved on January 11, 2008, from Data Network Resource. Website http//www.rhyshaden.com/osi.htm
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment