Preview

Security and the Osi Model Essay Example

Powerful Essays
Open Document
Open Document
1387 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security and the Osi Model Essay Example
Security and the OSI Model

Network security is a topic that reaches far beyond the realm of firewalls, passwords, and user ID accounts. For a network and data to remain secure there must be protective measures at each level in the OSI interconnect model. While each layer basically operates autonomously of the other it is important to ensure that the data being transmitted from the host to destination has not been tampered with or is being prevented from reaching its destination. There are seven level to the OSI interconnect model; each with its own special tasks, abilities, and weaknesses. There are seven layers in the OSI interconnect model; they are the Physical, Datalink, Network, Transport, Session, Presentation, and Application layers. Layer one the physical layer deals with the actual physical connections to the real world. All of the wires, power cords, and hardware that make up the physical portions of a network are part of the physical layer. There are several security issues that can cause physical layer problems within a network. The easiest way to cause a denial of service would be to simply remove power or disconnect or cut an important network cable going to a crucial piece of equipment. Another security concern would be a tapping of the physical medium allowing an attacker to copy or even corrupt the data stream. The best way to prevent these types of attacks is to keep facilities secure, keep all critical areas under lock and key and perform routine audits to ensure the infrastructure is safe and secure.

The second layer in the OSI model is the data link layer; here data is transmitted and received reliably across a physical medium.
Two of the biggest threats to the data link layer have to deal with ARP and the process of wardriving. ARP is the protocol that maps an IP address to a physical address or MAC address within the network. ARP is a simple protocol that was never designed for authentication. Any end station that has

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1330 Unit 4

    • 3225 Words
    • 13 Pages

    The value of layers in the OSI reference model is that it divides networking into a series of tasks, and then illustrates how those tasks relate to each other.…

    • 3225 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    Mt1310 Unit 7 Essay

    • 1045 Words
    • 5 Pages

    The hardware and software functions of the SS7 protocol are divided into functional abstractions called "levels." These levels map loosely to the Open Systems Interconnect (OSI) 7-layer model defined by the International Standards Organization (ISO).…

    • 1045 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Because the upper layers of the OSI model are for getting the information ready to be viewed. By the time the information needs to go through the upper layers, it has already reached its destination.…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The point when individuals discuss about OSI, they are typically alluding to what is formally known as the Basic Reference Model (BRM) for Open Systems Interconnection (OSI). The BRM…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    OSI Model Key Terms Table

    • 552 Words
    • 3 Pages

    | This Layer is what makes up the Data Link Layer of the OSI mode.…

    • 552 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 Lab 2.1

    • 374 Words
    • 2 Pages

    Almost all networks in use today are based in some fashion on the Open Systems Interconnection (OSI) standard. The core of this standard is the OSI Reference Model, a set of seven layers that define the different stages that data must go through to travel from one device to another over a network. But the OSI is just a guideline.…

    • 374 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 assignment 1

    • 347 Words
    • 2 Pages

    ARP – A protocol that allows an IP host on a LAN to discover the MAC address of another host on the same LAN.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Interconnection (OSI) Model - is a conceptual and logical layout that defines network communication used by systems open to interconnection and communication with other systems.…

    • 559 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    It230 Wk1 Checkpoint

    • 576 Words
    • 3 Pages

    The first layer, physical, obtains a function that has the purpose of sending or receiving data by way of signals or voltages through physical aspects such as, cables or cards. With such data, signals, voltages, physical aspects of cables and cards, it is what is utilized in network connecting. The second layer, data-link, consists of encoded, decoded bits of data packets, which consists also of a management, knowledge transmission-protocol that works in connection with two additional internal layers, “media access control (MAC) layer and the logical link control (LLC) layer”, (2006. PP.S3). Both additional layers serve a function and purpose that determines how data is accessed from a network computer, gives it the data transmit permission, and controls in relation to checking for error(s), controls flow, and synchronization of the frame.…

    • 576 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    nt1210

    • 831 Words
    • 4 Pages

    Define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or internet research to support your answer.…

    • 831 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Dq 1 and 2 Week 4

    • 1894 Words
    • 8 Pages

    Here goes: When it comes to developing security protocols for your organization the OSI model will play a critical role in determining what risks are present to each area of the network, by evaluating each layer of the OSI model and protecting each vulnerability found. The physical layer shows us that the physical network and resources need to be protected. Doors to server rooms need to be kept under lock and key, and only authorized personnel need to have access to these resources. Another important part of the physical layer would be the actual data storage and recovery. It is important to have a source for information backup kept offsite, in the case of an environmental disaster on location. The next layer, the data-link layer, exposes a vulnerability in the exposure of datagrams on the network. At the data-link layer there are threats such as MAC flooding,, ARP and Spanning-Tree attacks, or MAC spoofing to gather traffic destined for a different machine. Hackers use these methods to grab data from the network which can include usernames and passwords to even more sensitive information. It is important to disable untrusted Layer 2 ports. This will limit traffic between hosts and close up any vulnerabilities. Layer 2 switches can also establish Virtual Local Area Networks, which separate networks logically on the same physical network. QoS protocols can also provide additional protection by providing better bandwidth utilization. At the network layer, which is responsible for addressing and routing frames, the best path is determined for…

    • 1894 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    CMGT 430 Complete Class

    • 2190 Words
    • 12 Pages

    It is important to know the different interconnections each system has. IT systems do not operate alone in the modern enterprise, so securing them involves securing their interfaces with other systems as well.…

    • 2190 Words
    • 12 Pages
    Powerful Essays