Top-Rated Free Essay
Preview

Osi & Security Layers

Satisfactory Essays
495 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Osi & Security Layers
Reginald Monroe-@02516632
Summary of OSI layers & Security

OSI stands for Open Systems Interconnection and it was developed by the Europeans in the 1980’s. OSI is divided into two major fields, an abstract model of networking and a set of defined protocols. The seven layers of the OSI basic reference model are listed and defined below (from bottom to top): 1. The Physical Layer – this layer describes the physical components of the various communications media, it also includes the electrical properties and interpretation of the signals exchanged.
Many security breaches can be found at the physical layer, and they deal with the physical security attributes. This could be done a number of ways: * Disrupting a power source. * Changing of interface pins * The cutting of cables * Tampering with a fuse box connected to your network 2. The Data Link Layer – this layer describes a logical organization of data bits transferred through a chosen medium.
The data link layer can be breached in several ways, mainly by altering the MAC information, better known as ARP Cache Poisoning. This can be prevented first at the physical layer, and is rarely done in less someone is on the same network as the poisoner. 3. The Network Layer – this layer describes how a series of different data links can transfer data between any two nodes in a network.
This is commonly attacked by those users outside of the network, by use of routers. Routers running older software versions are relatively more prone to attack. Password buffer overflow is one of the most common ways to intrusion.

4. The Transport Layer- this describes the quality and nature of the delivery of the data.

The transport layer can be breached in many ways. One of the most common way that the transport layer can be breached is port scanning as well as a “half-open” scan. This is the way attackers gather information about open ports on your system. Most attackers use NMAP because only an internet connection is needed to begin malicious activities.

5. The Session Layer- this describes data organization sequences that are larger than the packets handled by the lower layers.
Most hijacking on the session layer at the start of a TCP session, since most authentication only occurs at the start of TCP, it allows the hacker to gain access to the machine. Proper authentication is the first and most important weapon in the line of defense.

6. The Presentation Layer- this describes the syntax of data being transferred.
What makes the presentation layer more succeptible to attack is Unicode vulnerabilities. Protecting against Unicode vulnerabilities is often as simple as applying a recommended patch from a vender.

7. The Application Layer – this describes how real work actually gets done.
The most well know and the most vulnerable part of security is done at the application layer with Trojan horse and viruses. Our computer can be best protected by use of antivirus and only downloading trusted applications.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The reason for picking answer A and D is because they are the only that makes sense. The purpose of the transport layer takes a large amount of packet or data and sends it on the network and break it into smaller pieces on the source host. Then, the network layer take the same data or packet and reassemble them for the destination host on the network.…

    • 247 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    Which layer of the OSI reference model permits the devices on the network to hold ongoing communications across the network?…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    At the destination this layer is responsible for combining the packets into their original state. This layer also checks to see if the layers are in the right order when received and not in duplicated form. If there is an error in one of the packets there is a request for that packet's retransmission. There are two protocols that sit at this layer. First, the TCP protocol connects the sender and the receiver using a socket which is determined by the IP address and port number. TCP keeps track of the packet delivery order and which ones need to be resent. UDP on the other hand is a connectionless communication and does not guarantee packet delivery between sender and receiver. Because it is connectionless the sender sends the data into the network with an IP address of the receiver and hopes it makes it to its destination. Since there is not a way of asking the sender to retransmit because of an error there is little error protection if…

    • 1266 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Nt1210 Lab 3.1 Essay

    • 453 Words
    • 2 Pages

    At the point when information is transmitted between two separate has the OSI process must be differentiated and sent in distinctive portions. Consequently the accepting host must get these sections. The deencapsulation is the methodology differentiating the information into workable stages that the accepting host can transform in place for the application to translate it legitimately.…

    • 453 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 1 Assignment

    • 987 Words
    • 4 Pages

    Layer 4: The transport layer...This layer manages the end-to-end control (for example, determining whether all packets have arrived) and error-checking. It ensures complete data transfer.…

    • 987 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. The data link layer strips the data-link header and trailer, and then passes the remaining data up to the network layer.…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Combines layers 5, 6 and 7: provides network services such as email, file transfers, exchanges of data, support connections between sessions and inner host communications…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    Answer: C. The physical layer sits just below the data link layer. D. The physical layer sits just below the data link layer.…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    This layer holds whatever IP will run above, e.g., Ethernet, token-ring, and Fiber Distributed Digital Interface (FDDI) systems. Distinct network protocols, e.g., Ethernet, exertion at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    b. It travels down each layer to the physical layer and is sent via some physical media to the destination and goes back up the OSI model.…

    • 1636 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 2 Essay

    • 418 Words
    • 2 Pages

    The Data Link Layer provides the connections between entities on the network it handles getting data over a specific medium. This layer handles Flow Control and layer sequencing if required. The correct sequence is preserved within the frames it also handles transit delay. This layer also checks the frame for errors using the FCS if it detects errors it discards the frame. Examples are IEEE 802.2, 802.3, HDLC, and Frame…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3220

    • 1161 Words
    • 8 Pages

    4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…

    • 1161 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Mis 589 Unit 7

    • 943 Words
    • 4 Pages

    Each computer in the network has software that operates at each of the layers and performs the functions required by those layers. Each layer in the network uses a formal…

    • 943 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    A divide and conquer approach permits concerns related to networking hardware to be completely separated from those related to networking software.…

    • 694 Words
    • 3 Pages
    Powerful Essays

Related Topics