Many of you have learned about the OSI and many

Many of you have learned about the OSI and many do not get how this is applicable beyond foundational knowledge.  I would like you to take another look at the OSI model and each layer discuss a possible security risk you see in each layer.  You will see a common theme by the end of the discussion.

Example:  Use only as example!

This week we discuss the security vulnerabilities that are found in each layer of the OSI model.  The physical layer is up first.  Vulnerabilities in the physical layer have been discussed extensively in previous weeks.  One possible security risk is for an adversary to infect a USB drive and then physically plug it in to a networked device.

The next layer is the data link layer.  It is the layer responsible for the transmission of data between nodes.  A security threat in this layer would be for a potential adversary to corrupt or alter data that is about to be sent through the node.  This would subsequently alter the data that is transmitted form its original and intended form.

The network layer is responsible for routing messages through different networks.  A vulnerability here could be a data worm that has infected a device in one network, being transported via the network layer to another network.  The worm will then be able to infect the devices within the new network.

The transport layer is the first in the upper layer and is responsible for breaking messages down in to pieces before sending them onward.  A potential vulnerability here is for the interception of unencrypted messages being sent through the transport layer by an adversary.

Session layer is next and is responsible for passwords exchanges, log offs, and termination of connections.  A vulnerability here would be an adversary keeping the gateway open and preventing the session layer from terminating the connection.  This would allow the adversary access to the data protected beyond the password gateway.

The presentation layer provides conversion service which cause character change sequences.  A vulnerability here could be an adversary corrupting the change sequence which would produce the incorrect data once it has been converted.

The final layer, the application layer is the layer most responsible for communication of the various applications being utilized.  One of the vulnerabilities present here would be the potential for a virus to cause the application layer to redirect data that flows through it.  

One of the common themes I see running through here is the spread of corruption and viruses.  Each layer has the potential to spread malicious content.  The conclusion this brings me to is that each layer must be properly defended with modern security protocols.

Jacobs, S. (2015) Engineering Information Security : The Application of Systems Engineering Concepts to Achieve Information Assurance

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Accounting ways – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

HIPAA is a law that was enacted to protect patients’

 HIPAA is a law that was enacted to protect patients’ private health information (PHI). The HIPAA law was enacted in 1996. This law has since been amended to include more specifics on PHI as it relates to technology. Most recently, in 2009, HITECH, a segment of the American Recovery and

VISIONS OF LIGHT Movie review

Watch movie:VISIONS OF LIGHT Cinematography from the Masters Link: https://www.youtube.com/watch?v=kGx5s6cOLBA&t=1452s Here are some example files for you to base your own journal entries on. This should give you ideas about length, content, and style. You are expected to record the basic information about each speaker (or film), then your own observations and

Christian Science

1.       Double-space with 12 size Times New Roman font. 2.       Use in-text parenthetical citations for quotes or simply cite the online resource material that you used. 3.       Topic: Christian Science   4.       Write a 3 page paper on -the movements founder, -polity (how it is governed) -theology (beliefs) -and whether it is

Prepare and submit through Turnitin, an 8 – 10 page

 Prepare and submit through Turnitin, an 8 – 10 page paper that discusses strategies to build a learning organization in a specific team or department. The paper consists of two parts 1. As a case analysis, identify a challenge a specific organization that is not a learning organization faces; diagnose

No matter how trusted and successful an organization may be,

   No matter how trusted and successful an organization may be, it cannot afford to have such success without its customers. The public is the one that can help them and their businesses rise from the ashes and can also sell them off whenever they want. Public relations is the

Counseling Specializations and Multidisciplinary Teams

Overview Counseling professionals from different specializations frequently need to work together to provide effective services to students, families, and individual clients. This assignment asks you to address this need in two parts, using what you have learned in this course so far. In Part 1, focus on theory and concepts,

The U.S. Constitution affords citizens various rights and freedoms. These

   The U.S. Constitution affords citizens various rights and freedoms. These include freedom of religion, freedom from unreasonable search and seizures, and the right to equal justice. As upholders of the Constitution, police officers swear an oath to uphold people’s Constitutional rights as they perform their duties to prevent, reduce,

Write 500 words (+ 50 words) using APA style format

 Write 500 words (+ 50 words) using APA style format to answer each of the following questions:  One argument in the debate surrounding globalization is about the inequality between nations. Has COVID exacerbated this inequality? Explain your answer giving specific examples of inequality to support your comments.   Each report should

Case Scenario Two You need a back operation but cannot

  Case Scenario Two You need a back operation but cannot afford your cost share of the operation. You have heard that other countries may offer less expensive medical procedures. You decide to investigate this option. Activity Perform an Internet search and use textbook information on medical tourism. Locate two

Jonathan Edward’s writing style

Attention grabber – _How many preachers do you know graduate that have graduated from Yale at the age of fourteen and a dispassionate revivalist in their twenty’s? ________________________________________________________________ Edwards preaching style contributed to the first great awakening. Edwards’s most famous writing was the “Sinners in the Hands of an Angry

Please compose a power point presentation that will include Nursing Assignment Help

Please compose a power point presentation that will include the following components: the paper is attached  Topic Background Problem Statement Research Design Data Collection What you anticipate to find Why it is important https://www.mediafire.com/file/3g4f1rafk35uclq/Literature+Review+-+Healthcare+Access+Disparities+in+Underserved+Communities.+(3)+(1)+(1)+(2)+(1)+(2).docx/file https://www.mediafire.com/file/b9crdpvr3itw02n/IMG_2627.jpg/file    This link is a pic of the rubric 

This week, you learned about victimology, including victim characteristics; and

This week, you learned about victimology, including victim characteristics; and you read about behaviors and environments that contribute to victimization. For your assignment, you will prepare a presentation designed to educate public policy makers about the incidence of victimization. Additionally, you will propose a victimization prevention plan. You can choose

Assignment 2 This assignment covers chapter three, Internal Analysis: Distinctive

Assignment 2 This assignment covers chapter three, Internal Analysis: Distinctive Competencies, Competitive Advantage, and Profitability, and chapter four, Building Competitive Advantage through Functional-Level Strategy. Chapter 3 Questions: Define value creation for customers and the components that can be used to determine value creation per unit. How value creation is related

Risk Management: Hippa Compliance

Sources, a minimum of 4, must be used in the response. Each source must be cited within the body of the response. The response must be typewritten and double spaced. Students may submit their analysis for feedback prior to submitting the final document. To be assured of obtaining the feedback

Yoder-Wise (2019) compares and contrasts the role of leader versus

 Yoder-Wise (2019) compares and contrasts the role of leader versus manager and uses several theories to guide practitioners. Which theories are akin to your own? Critically examine these theories as you differentiate between the two roles. Which attributes of leaders and managers (Chp. 26- Table 26-1) do you deem the

Employee Health and Safety

 Description Assignment 1: Discussion—Employee Health And Safety: A Global Perspective (Topic) Employee Health and Safety: A Global Perspective. BANKS Industries is currently operating in both the United States and China. As a US-based company, BANKS is accustomed to conforming to US law regarding employee health and safety. However, Chinese law

this assignment is due on Tuesday. There is no extended

this assignment is due on Tuesday. There is no extended time for this.  Read the “assignment” part in the attachment.   You choose a photo of a place and then do the assignment.  750 to 1,000 words Develop an argument analyzing a photo of a place that’s important to you