Preview

Dq 1 and 2 Week 4

Good Essays
Open Document
Open Document
1894 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Dq 1 and 2 Week 4
I see that as a good analogy and I understand that the OSI model is broken down into seven layers and each layer has a job to do I was wondering which of these layers would be most important in developing security protocols for my company?

Since no one else answered this one I thought I would take a stab at what I would say to my “potential client” if I was asked this very legitimate question during my hypothetical meeting.
Here goes: When it comes to developing security protocols for your organization the OSI model will play a critical role in determining what risks are present to each area of the network, by evaluating each layer of the OSI model and protecting each vulnerability found. The physical layer shows us that the physical network and resources need to be protected. Doors to server rooms need to be kept under lock and key, and only authorized personnel need to have access to these resources. Another important part of the physical layer would be the actual data storage and recovery. It is important to have a source for information backup kept offsite, in the case of an environmental disaster on location. The next layer, the data-link layer, exposes a vulnerability in the exposure of datagrams on the network. At the data-link layer there are threats such as MAC flooding,, ARP and Spanning-Tree attacks, or MAC spoofing to gather traffic destined for a different machine. Hackers use these methods to grab data from the network which can include usernames and passwords to even more sensitive information. It is important to disable untrusted Layer 2 ports. This will limit traffic between hosts and close up any vulnerabilities. Layer 2 switches can also establish Virtual Local Area Networks, which separate networks logically on the same physical network. QoS protocols can also provide additional protection by providing better bandwidth utilization. At the network layer, which is responsible for addressing and routing frames, the best path is determined for



References: Scribd Inc. (2013). CWNA Guide to WirelessLANs, Second Edition. Retrieved from scribd.com: http://www.scribd.com/doc/19213695/CWNA-Guide-to-Wireless-LANs-Second-Edition-Chapter-4#page=5

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    MAT117 Week 6 DQ 2

    • 1825 Words
    • 6 Pages

    Well other than the way its listed in the text the way that the pythagorean theorem can be used any time is when we have a right triangle, we know the length of two sides, and we want to find the third side. A basic example I would like to use is the following which is I was in Walmart the other day and saw a nice entertainment center on sale at a good price. The space for the TV set measured 17" x 21". I didn't want to take the time to go home to measure my TV set, or get the cabinet home only to find that it was too small. I knew my TV set had a 27" screen, and TV screens are measured on the diagonal. To figure out whether my TV would fit, I calculated the diagonal of the TV space in the entertainment center using the Pythagorean theorem: 172 + 212 = 289 + 441 = 730 So the diagonal of the entertainment center is the square root of 730, which is about 27.02". From figuring that out i saw that my tv should fit, but the 27" diagonal on the TV set measures the screen only, not the housing, speakers and control buttons. These extend the TV set's diagonal several inches, so I figured that my TV would not fit in the cabinet. When I got home, I measured my TV set and found that the entire set was 21" x 27.5", so it was a good decision not to buy the entertainment center.…

    • 1825 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    MAT117 Week 5 DQ 1

    • 1249 Words
    • 5 Pages

    When simplifying radicals, there are two steps that you should follow and it is important that you do not skip either step. The steps needed to simplify radicals are to:…

    • 1249 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Mt1310 Unit 7 Essay

    • 1045 Words
    • 5 Pages

    The hardware and software functions of the SS7 protocol are divided into functional abstractions called "levels." These levels map loosely to the Open Systems Interconnect (OSI) 7-layer model defined by the International Standards Organization (ISO).…

    • 1045 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Dq1 Week 3

    • 389 Words
    • 2 Pages

    Why do accrual basis financial statements provide more useful information than cash basis financial statements?…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The 7 layers can be split logically into two subgroups. Layers 7 thru 4 focus on the end to end communication of data source and destinations. Layers 3 thru 1 are provide consistent communication between the network devices. An easier way of looking at the OSI model is dividing the upper layers (7, 6, 5) from the lower layers (4, 3, 2, 1). The upper layers deal with application issues and are implemented only in software. The highest layer, the application layer, is the closest to the end user. The lower layers are responsible for the transportation of the data. The physical layer and the data link layer are implemented in hardware and software. The lowest layer, the physical layer, is closest to the physical network medium (the wires, for example) and is responsible for placing data on the medium.…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The main difference between the two is that OSI has broken down the TCP/IP’s application layer to Session, Presentation, and…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Satisfactory Essays

    nt1210

    • 831 Words
    • 4 Pages

    Define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or internet research to support your answer.…

    • 831 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Hcr 210 Week 3 Dq 2

    • 435 Words
    • 2 Pages

    What do you think is the reasoning for not filing incident reports in medical records? Provide examples of three incidents and explain why they could be problematic in patients’ files.…

    • 435 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Mgt448 Week 1 Dq's

    • 738 Words
    • 3 Pages

    What technological advances in telecommunications and transportation have influenced global business in the last decade? How have these technological advances affected regional economic development?…

    • 738 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Kudler Security Report

    • 8349 Words
    • 34 Pages

    7. Communications and operations management: Incorporates operational procedures and responsibilities, third-party service delivery management, systems palnning and acceptance, protection against malicious and mobile code, backup, network security management, media handling, exchange of information, electronic commerce services and monitoring…

    • 8349 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    A layered security strategy will encompass Rouge protocols such as Bit mining and P2P, Unauthorized network scanning and probing, and unauthorized access to the network.…

    • 928 Words
    • 3 Pages
    Good Essays