Preview

Osi Layers

Good Essays
Open Document
Open Document
597 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Osi Layers
The OSI model has seven layers, with each having different types of security responsibilities. The seven layers are application, presentation, session, transport, network, datalink and physical with control being passed down from layer to layer starting with application. The biggest threat to these layers is through people, sometimes known as the 8th layer of the OSI model.
Companies should take the time to educate their employees on the security threats that each individual brings to the company. Throwing personal information into a dumpster and not shredding this information is a huge security risk. Each individual is given a password to access the system for his or her job and should never reveal their password to anyone. Employee’s must keep in mind that anything done under their login and password is considered that persons responsibility and therefore, by keeping their password safe, it eliminates the possibility of someone else using his or her log-in for malicious purposes.
The first real layer of the OSI level is the application layer. It includes software such as File Transfer Protocol (FTP), telnet, DNS, HTTP. FTP is used to move files from one system to another and is at high risk for hacking. More secure FTP programs exist today called FTP over SSL and FTP over SSH. All Banks use the more secure FTP programs to do EFT transfers. When using telnet a company should require a login and password even if they allow anonymous connections. Telnet transfers in clear text which can allow a hacker to read the clear text as it goes over the network. DNS is an application that translates addresses as they come in, if they are not configured correctly a full zone transfer. HTTP security issues revolve around that fact that hackers can get to the web server and create a backdoor. HTTP’s were introduced to stop this back door from happening.
Data Line Layer “responds to service requests from the network layer and issues service requests to the physical

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Combines layers 5, 6 and 7: provides network services such as email, file transfers, exchanges of data, support connections between sessions and inner host communications…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt2799 Oral Exam

    • 7416 Words
    • 38 Pages

    a. Layer 1: The physical layer...This layer conveys the bit stream through the network at the electrical and mechanical…

    • 7416 Words
    • 38 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    This layer holds whatever IP will run above, e.g., Ethernet, token-ring, and Fiber Distributed Digital Interface (FDDI) systems. Distinct network protocols, e.g., Ethernet, exertion at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1210 Lab 3.1 Review

    • 505 Words
    • 3 Pages

    The OSI model is not directly implemented in networking and often the distinction between the layers will blur in implementation. Why does it endure despite these issues? Use your textbook and Internet research to justify your answer.…

    • 505 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Webopedia.com, (2010). The 7 Layers of the OSI Model. Retrieved on Wednesday, October 20, 2010, from http://www.webopedia.com/quick_ref/OSI_Layers.asp…

    • 1324 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    When developing a multi-layered security plan, you must look at each of the seven domains of the IT infrastructure and increase security on each of those domains. The seven domains are user domain, workstation domain, LAN domain, LAN to WAN domain, WAN domain, and remote access domain. Increasing the security on each of those seven domains will increase the overall security of the system and create a multi-layered security plan.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Consumer or user loosing data permanently is the last thing that a company can afford in enterprise scale. Phishing, taking Advantage of software loop holes, password loss can all lead to loss of control over the user information. Most security measure being refraining from sharing credentials between users and use a strong encryption -Decryption while exchanging critical…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    5. What are the seven layers of the OSI model (in order)? What is the role of each layer?…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    nt1210

    • 831 Words
    • 4 Pages

    Define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or internet research to support your answer.…

    • 831 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Hsc300 Week 2 Assignment

    • 866 Words
    • 4 Pages

    This week we covered some additional information in regards to the data layer, more specifically the MAC layer, and went into the network layer of the OSI model. As part of that we discussed different routing protocols and systems.…

    • 866 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 9 L3 BTEC IT P2

    • 339 Words
    • 2 Pages

    The open system interconnect (OSI) mdel has seven layers for communication and network protocols. The layers consist of presentation, application, session, transport, data, network and physical. These standards are the platform from which computers communicate. During this communication certain rules must be followed by the sender and the recipient for the communication to be successful.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    The OSI model interacts with protocols that correspond with each layer and help regulate and manage the network communications. There are many protocols which work…

    • 1514 Words
    • 7 Pages
    Best Essays