Security And The Osi Model Essay

1411 words - 6 pages

Security and the OSI Model

Network security is a topic that reaches far beyond the realm of firewalls, passwords, and user ID accounts. For a network and data to remain secure there must be protective measures at each level in the OSI interconnect model. While each layer basically operates autonomously of the other it is important to ensure that the data being transmitted from the host to destination has not been tampered with or is being prevented from reaching its destination. There are seven level to the OSI interconnect model; each with its own special tasks, abilities, and weaknesses.
There are seven layers in the OSI interconnect model; they are the Physical, Datalink, Network, Transport, Session, Presentation, and Application layers. Layer one the physical layer deals with the actual physical connections to the real world. All of the wires, power cords, and hardware that make up the physical portions of a network are part of the physical layer. There are several security issues that can cause physical layer problems within a network. The easiest way to cause a denial of service would be to simply remove power or disconnect or cut an important network cable going to a crucial piece of equipment. Another security concern would be a tapping of the physical medium allowing an attacker to copy or even corrupt the data stream. The best way to prevent these types of attacks is to keep facilities secure, keep all critical areas under lock and key and perform routine audits to ensure the infrastructure is safe and secure.

The second layer in the OSI model is the data link layer; here data is transmitted and received reliably across a physical medium.
Two of the biggest threats to the data link layer have to deal with ARP and the process of wardriving. ARP is the protocol that maps an IP address to a physical address or MAC address within the network. ARP is a simple protocol that was never designed for authentication. Any end station that has access to the layer two environment can claim any IP address if the proper security measures are not taken. ARP spoofing or ARP poisoning occurs when an attacker's computer forges its credentials to allow the host to believe that it is the intended recipient. If the attackers computer forwards all of the data that is to be sent to the intended host it is very likely that the "man in the middle" would go undetected. At any time the attacker can make changes to the data that is forwarded, copy and use the data, or flood the network with erroneous packets that cause data collisions and effectively bring network traffic to a halt. The process of wardriving is a new threat that has surfaced with the popularity of 802.11 style wireless connections. Poor security with these devices allows an attacker virtually unrestricted access to the data link layer and beyond. It is not very difficult to walk around various areas in a busy metropolitan area and pick up unsecured wireless signals and...

Find Another Essay On Security And The OSI Model

Tuckman’s Model and the Nadler and Tushman Model

1288 words - 5 pages Tuckman’s Model and the Nadler and Tushman Model Bruce Tuckman first developed Tuckman’s forming, storming, norming and performing model in 1965. Later on in 1977, Tuckman and Mary Ann Jensen jointly added adjourning stage. Tuckman’s theory is a helpful and elegant illustration of team behavior and development. The model explains that as team abilities mature, relationships are forged and the leader changes the style of leadership. The leader

Bowen’s Family Theory Transgenerational Model, and The Structural Model

2430 words - 10 pages This paper will look at the following family by correlating Bowen’s Family Theory Transgenerational Model, and The Structural Model. The subjects of the case are Jan and John. The study describes the couple as Caucasians of Polish descent, both on their first marriage; they share three adult children who live in the same household. Their youngest child is a single mother with a four-year-old child. This couple is seeking marriage therapy for

Security, commerce and the int

1123 words - 4 pages Security, Commerce and the Internet As the internet/world wide web (www), gradually became more available to ordinary computer users, it was obvious that it would become a target market for commercial retailers, financial services, etc. The benefits to seller and buyer are readily apparent - shopping and banking from home; travel arrangements; ticket reservations; and holidays can all be purchased quickly and accurately. Access to a

Security and The International System

790 words - 3 pages States saw no reason to become a threat allowing other power to bandwagon with the United States in accordance with Stephen Walt’s balance-of-threat thesis. Through the containment of the Soviet Union, these institutions took root and created a convergence of the world’s nations under the United States. With the only potential rival collapsing in 1991, the security of the United States military allowed nations to focus resources on economic

The History of Social Security and Social Security Administration

1452 words - 6 pages Social Security and Social Security Administration Michael Jones worked his whole life. At the age of 15 he started as a dishwasher at a restaurant a mile away from his house. He never graduated high school because he had to quit school to help his single mom support a family of six. There were many times in his life where he worked two jobs, but at minimum-wage, if that, 80 hours a week still did not go far. By the age of 20 he was married, and

The classical model and the great depression

2084 words - 8 pages each job. This caused production to skyrocket, lowering costs, and therefore increasing profits. Henry Ford spent his increased profits on his consumers and employees. Not only did he lower the cost of the model T from $5,000 to $300, but he also doubled his employees' wages. Dance marathons were another popular thing to spend money on. These marathons would last months at a time. A person could go for only a quarter and stay as long as they

Henry ford and the Model T Ford

1102 words - 5 pages hour (Mitchell,34). People became less concerned with what a car looked like and judged each other on how fast their car went. This behavior became less frequent when cars became even more of a necessity than a play toy. Years after the success of the Model T, Ford created the Model A. This new car pumped out forty horse power. Ford made two million model a cars in 1929. The lines of the Model A suggested those of its richer relative lincoln-so

Model Minorities and The Joy Luck Club

1019 words - 5 pages promise of the American Dream, children of Chinese immigrants suffer from many problems arising from the many stereotypes and their misrepresentation as a “model minority” by native-born Americans. Amy Tan exemplifies this discrepancy between Chinese and American views on Chinese American children in The Joy Luck Club. The American Dream is not fruitful for immigrants of color because they are misnomered as model minorities, despite the

Health and Society: The Health Belief Model

2354 words - 9 pages interplay of numerous other factors that ultimately influences a particular health behaviour; these include social, cultural and environmental influences. All these stimuli interact and result in a set of beliefs that provides the basis for why individuals act the way they do. The Health Belief Model (HBM) is a psychological model that attempts to explain and predict health behaviors by focusing on the attitudes and beliefs of individuals (Health

Relationship and Attraction: The Attraction-Similarity Model

1838 words - 7 pages rest of the world what is it that separates a couple? Could it be associated with the fact that the number one argument couples have is about money( ) ? Why do some marriages last and others end? These are the questions and theories I have searched for. From my research I have investigated different theories pertaining to this issue. The theory most often noted in this issue is the attraction-similarity model. This theory states that the more

Neuroticism and The Five Factor Model

2607 words - 10 pages Neuroticism boldly contrasts with the other personality traits in the Five Factor Model for personality (Openness, Agreeableness, Extraversion, Contentiousness, and Neuroticism). An individual being high in any of the other four traits could hardly be considered pathological. For example, high levels of agreeableness, within reason, would probably be considered to be a positive and healthy characteristic. However, the discussion regarding

Similar Essays

Security And The Osi Model Essay

1605 words - 6 pages Abstract The Open Systems Interconnect (OSI) model is a standard reference model for the communication between two end users. Seven different layers make up the OSI model: physical, data link, network, transport, session, presentation, and application. This paper will cover the type of security that is associated with each level of the OSI model. Physical Layer The physical layer is where the actual communication occurs between

How The Osi Model Works Essay

600 words - 2 pages I will try to explain how the OSI model works so that itis easier to understand for those that have trouble withthe concept. Think of communications in terms of people.Each person that you talk to is like a computer with itsown capacity to compute and / or calculate information.If I speak directly with you and share information, thatis like a peer to peer network. There really isn'tany "hardware" at the physical layer involved to conductthis

The Main Benefits Of The Osi Model

585 words - 2 pages The main benefits of the OSI model include the following: • Helps users understand the big picture of networking • Helps users understand how hardware and software elements function together • Makes troubleshooting easier by separating networks into manageable pieces • Defines terms that networking professionals can use to compare basic functional relationships on different networks • Helps users understand new

Shedding The Light On The Network, Transport And Application Layer Protocols Of Osi Model

2406 words - 10 pages Executive Summary This report is a response to an individual assignment to partially fulfill the requirements of (TN6384 Computer Network) module. It aims to shed the light on the Network, transport, and application-layer protocols of OSI Model. The report begins with presenting a relevant background to the topic, presenting the historical perspective of OSI protocols. In addition, it explains the purpose and importance of these protocols
Rock.N.Roll.High.School.1979.German.DL.1080p.BluRay.AVC-AVCiHD | BonoBono (2016) | The Office UK