Friday, August 21, 2020

Security and the OSI Model Essay -- Networks Telecommunications

Conceptual The Open Systems Interconnect (OSI) model is a standard reference model for the correspondence between two end clients. Seven distinct layers make up the OSI model: physical, information interface, arrange, transport, meeting, introduction, and application. This paper will cover the sort of security that is related with each degree of the OSI model. Physical Layer The physical layer is the place the genuine correspondence happens between gadgets. The security of the physical layer relates to the genuine equipment. The vulnerabilities of the physical layer include: • Power blackout • Environmental control misfortune • Hardware robbery, harm or decimation • Unauthorized equipment changes (i.e.; removable media, information associations) • Detachment of the physical information joins • Unnoticeable Data Interception • Keystroke Logging Certain measures can be executed to guarantee the physical layer is secure. This would be finished by putting away all equipment in a bolted situation. The utilization of electronic locks would control and log all entrance to the room containing the equipment. The electronic locks could be a PIN and secret phrase or unique mark scanner (biometrics). The utilization of video and sound observation would give physical confirmation of unapproved get to that could bargain the equipment. Information Link Layer The second layer of the OSI model is the information connect layer. This is the layer that ship the information between organize hubs in a wide territory arrange (WAN) or on a similar neighborhood (LAN) between hubs. The information interface layer makes accessible the procedural and useful intends to move information between organize gadgets and could give the measures to discover and perhaps right blunders that may happen in the physical layer. The security vulnerabi... ...on. This is to stop any unapproved utilization of the system. End Taking everything into account, the data canvassed in this paper shows the various sorts of security that is related with each degree of the standard OSI model. From the physical layer to the application layer, each layer has an alternate kind of security which must be applied at each layer to forestall any security spills, parodying, and boundless circles. These are only a couple of the various vulnerabilities that must be ensured on a WLAN or LAN. References Reed (November 21, 2003). Applying the OSI seven layer model to Information Security. Recovered on January 11, 2008, from SANS Institute. Site: http://www.sans.org/reading_room/whitepapers/conventions/1309.php Haden (2008). The OSI Model. Recovered on January 11, 2008, from Data Network Resource. Site: http://www.rhyshaden.com/osi.htm Security and the OSI Model Essay - Networks Telecommunications Theoretical The Open Systems Interconnect (OSI) model is a standard reference model for the correspondence between two end clients. Seven distinct layers make up the OSI model: physical, information connect, arrange, transport, meeting, introduction, and application. This paper will cover the sort of security that is related with each degree of the OSI model. Physical Layer The physical layer is the place the real correspondence happens between gadgets. The security of the physical layer relates to the real equipment. The vulnerabilities of the physical layer include: • Power blackout • Environmental control misfortune • Hardware burglary, harm or obliteration • Unauthorized equipment changes (i.e.; removable media, information associations) • Detachment of the physical information joins • Unnoticeable Data Interception • Keystroke Logging Certain measures can be executed to guarantee the physical layer is secure. This would be finished by putting away all equipment in a bolted domain. The utilization of electronic locks would control and log all entrance to the room containing the equipment. The electronic locks could be a PIN and secret phrase or unique mark scanner (biometrics). The utilization of video and sound reconnaissance would give physical verification of unapproved get to that could bargain the equipment. Information Link Layer The second layer of the OSI model is the information connect layer. This is the layer that move the information between organize hubs in a wide region arrange (WAN) or on a similar neighborhood (LAN) between hubs. The information connect layer makes accessible the procedural and practical intends to move information between organize gadgets and could give the measures to discover and conceivably right mistakes that may happen in the physical layer. The security vulnerabi... ...on. This is to stop any unapproved utilization of the system. End All in all, the data canvassed in this paper shows the various sorts of security that is related with each degree of the standard OSI model. From the physical layer to the application layer, each layer has an alternate kind of security which must be applied at each layer to forestall any security spills, mocking, and unending circles. These are only a couple of the various vulnerabilities that must be ensured on a WLAN or LAN. References Reed (November 21, 2003). Applying the OSI seven layer model to Information Security. Recovered on January 11, 2008, from SANS Institute. Site: http://www.sans.org/reading_room/whitepapers/conventions/1309.php Haden (2008). The OSI Model. Recovered on January 11, 2008, from Data Network Resource. Site: http://www.rhyshaden.com/osi.htm

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.