Summary of OSI layers & Security
OSI stands for Open Systems Interconnection and it was developed by the Europeans in the 1980’s. OSI is divided into two major fields, an abstract model of networking and a set of defined protocols. The seven layers of the OSI basic reference model are listed and defined below (from bottom to top): 1. The Physical Layer – this layer describes the physical components of the various communications media, it also includes the electrical properties and interpretation of the signals exchanged.
Many security breaches can be found at the physical layer, and they deal with the physical security attributes. This could be done a number of ways: * Disrupting a power source. * Changing of interface pins * The cutting of cables * Tampering with a fuse box connected to your network 2. The Data Link Layer – this layer describes a logical organization of data bits transferred through a chosen medium.
The data link layer can be breached in several ways, mainly by altering the MAC information, better known as ARP Cache Poisoning. This can be prevented first at the physical layer, and is rarely done in less someone is on the same network as the poisoner. 3. The Network Layer – this layer describes how a series of different data links can transfer data between any two nodes in a network.
This is commonly attacked by those users outside of the network, by use of routers. Routers running older software versions are relatively more prone to attack. Password buffer overflow is one of the most common ways to intrusion.
4. The Transport Layer- this describes the quality and nature of the delivery of the data.
The transport layer can be breached in many ways. One of the most common way that the transport layer can be breached is port scanning as well as a “half-open” scan. This is the way attackers gather information about open ports on your system. Most attackers use NMAP because only an internet connection is needed to begin malicious activities.
5. The Session Layer- this describes data organization sequences that are larger than the packets handled by the lower layers.
Most hijacking on the session layer at the start of a TCP session, since most authentication only occurs at the start of TCP, it allows the hacker to gain access to the machine. Proper authentication is the first and most important weapon in the line of defense.
6. The Presentation Layer- this describes the syntax of data being transferred.
What makes the presentation layer more succeptible to attack is Unicode vulnerabilities. Protecting against Unicode vulnerabilities is often as simple as applying a recommended patch from a vender.
7. The Application Layer – this describes how real work actually gets done.
The most well know and the most vulnerable part of security is done at the application layer with Trojan horse and viruses. Our computer can be best protected by use of antivirus and only downloading trusted applications.
You May Also Find These Documents Helpful
-
The reason for picking answer A and D is because they are the only that makes sense. The purpose of the transport layer takes a large amount of packet or data and sends it on the network and break it into smaller pieces on the source host. Then, the network layer take the same data or packet and reassemble them for the destination host on the network.…
- 247 Words
- 1 Page
Satisfactory Essays -
Which layer of the OSI reference model permits the devices on the network to hold ongoing communications across the network?…
- 3225 Words
- 13 Pages
Powerful Essays -
At the destination this layer is responsible for combining the packets into their original state. This layer also checks to see if the layers are in the right order when received and not in duplicated form. If there is an error in one of the packets there is a request for that packet's retransmission. There are two protocols that sit at this layer. First, the TCP protocol connects the sender and the receiver using a socket which is determined by the IP address and port number. TCP keeps track of the packet delivery order and which ones need to be resent. UDP on the other hand is a connectionless communication and does not guarantee packet delivery between sender and receiver. Because it is connectionless the sender sends the data into the network with an IP address of the receiver and hopes it makes it to its destination. Since there is not a way of asking the sender to retransmit because of an error there is little error protection if…
- 1266 Words
- 6 Pages
Powerful Essays -
At the point when information is transmitted between two separate has the OSI process must be differentiated and sent in distinctive portions. Consequently the accepting host must get these sections. The deencapsulation is the methodology differentiating the information into workable stages that the accepting host can transform in place for the application to translate it legitimately.…
- 453 Words
- 2 Pages
Good Essays -
Layer 4: The transport layer...This layer manages the end-to-end control (for example, determining whether all packets have arrived) and error-checking. It ensures complete data transfer.…
- 987 Words
- 4 Pages
Good Essays -
4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…
- 700 Words
- 4 Pages
Satisfactory Essays -
4. The data link layer strips the data-link header and trailer, and then passes the remaining data up to the network layer.…
- 648 Words
- 3 Pages
Satisfactory Essays -
Combines layers 5, 6 and 7: provides network services such as email, file transfers, exchanges of data, support connections between sessions and inner host communications…
- 324 Words
- 2 Pages
Satisfactory Essays -
Answer: C. The physical layer sits just below the data link layer. D. The physical layer sits just below the data link layer.…
- 1325 Words
- 5 Pages
Good Essays -
This layer holds whatever IP will run above, e.g., Ethernet, token-ring, and Fiber Distributed Digital Interface (FDDI) systems. Distinct network protocols, e.g., Ethernet, exertion at this level.…
- 1263 Words
- 5 Pages
Powerful Essays -
b. It travels down each layer to the physical layer and is sent via some physical media to the destination and goes back up the OSI model.…
- 1636 Words
- 7 Pages
Satisfactory Essays -
The Data Link Layer provides the connections between entities on the network it handles getting data over a specific medium. This layer handles Flow Control and layer sequencing if required. The correct sequence is preserved within the frames it also handles transit delay. This layer also checks the frame for errors using the FCS if it detects errors it discards the frame. Examples are IEEE 802.2, 802.3, HDLC, and Frame…
- 418 Words
- 2 Pages
Satisfactory Essays -
4. Which of the following protocols is a connection-oriented protocol that operates at the transport layer of the OSI model and supports reliable connections?…
- 1161 Words
- 8 Pages
Powerful Essays -
Each computer in the network has software that operates at each of the layers and performs the functions required by those layers. Each layer in the network uses a formal…
- 943 Words
- 4 Pages
Good Essays -
A divide and conquer approach permits concerns related to networking hardware to be completely separated from those related to networking software.…
- 694 Words
- 3 Pages
Powerful Essays