Many of you have learned about the OSI and many

Many of you have learned about the OSI and many do not get how this is applicable beyond foundational knowledge.  I would like you to take another look at the OSI model and each layer discuss a possible security risk you see in each layer.  You will see a common theme by the end of the discussion.

Example:  Use only as example!

This week we discuss the security vulnerabilities that are found in each layer of the OSI model.  The physical layer is up first.  Vulnerabilities in the physical layer have been discussed extensively in previous weeks.  One possible security risk is for an adversary to infect a USB drive and then physically plug it in to a networked device.

The next layer is the data link layer.  It is the layer responsible for the transmission of data between nodes.  A security threat in this layer would be for a potential adversary to corrupt or alter data that is about to be sent through the node.  This would subsequently alter the data that is transmitted form its original and intended form.

The network layer is responsible for routing messages through different networks.  A vulnerability here could be a data worm that has infected a device in one network, being transported via the network layer to another network.  The worm will then be able to infect the devices within the new network.

The transport layer is the first in the upper layer and is responsible for breaking messages down in to pieces before sending them onward.  A potential vulnerability here is for the interception of unencrypted messages being sent through the transport layer by an adversary.

Session layer is next and is responsible for passwords exchanges, log offs, and termination of connections.  A vulnerability here would be an adversary keeping the gateway open and preventing the session layer from terminating the connection.  This would allow the adversary access to the data protected beyond the password gateway.

The presentation layer provides conversion service which cause character change sequences.  A vulnerability here could be an adversary corrupting the change sequence which would produce the incorrect data once it has been converted.

The final layer, the application layer is the layer most responsible for communication of the various applications being utilized.  One of the vulnerabilities present here would be the potential for a virus to cause the application layer to redirect data that flows through it.  

One of the common themes I see running through here is the spread of corruption and viruses.  Each layer has the potential to spread malicious content.  The conclusion this brings me to is that each layer must be properly defended with modern security protocols.

Jacobs, S. (2015) Engineering Information Security : The Application of Systems Engineering Concepts to Achieve Information Assurance

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Book Review: McCaskell, Tim Queer Progress From Homophobia to

6.a. Book Review: worth 25 %; Note: All students are expected to read one chapter from each of the following books (see weekly readings for details). Pick ONE of the following books and write a critical review of it of about 10 pages (double spaced). The review should provide a

Chapter 14: Project RiskInitial Postings: Read and reflect on the

Chapter 14: Project RiskInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon

Immunoglobulin A – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

In the Unit 2 Lab assignment, we continued to learn

   In the Unit 2 Lab assignment, we continued to learn how to analyze wireless traffic using Wireshark and also began learning how to analyze wireless traffic using the NetWitness Investigator Tool. I began with practicing loading a file of traffic that Wireshark had previously captured. We reviewed previously captured

(at least 300 words per prompt) An 18 year old

  (at least 300 words per prompt) An 18 year old female is being seen in the office for lower abdominal pain and irregular menstrual bleeding. The physician wants to rule out PID and endometriosis. What are the sign and symptoms, and etiology of PID and endometriosis? What diagnostic test

Describe the epidemiology of tuberculosis. Identify three factors (social, economic,

  Describe the epidemiology of tuberculosis. Identify three factors (social, economic, and/or political) that have contributed to the global resurgence of TB. Compare and contrast statistics regarding tuberculosis globally, in the United States, and in your state (identify the state about which you are writing). Summarize continuing challenges to TB

Introduction In this course, you are learning Coach Gibbs’s strategies

  Introduction In this course, you are learning Coach  Gibbs’s strategies for motivating teams. You will apply that knowledge  in this week’s assignment by putting together the first part of a  Motivational Game Plan. You will return to the Motivational Game Plan in each course assignment, adding additional components based

Create a powerpoint with in depth speaker notes Scenario You

 Create a powerpoint with in depth speaker notes Scenario You are newly appointed to the communication team for a reputable philanthropic organization. The current task is for your team to create a global campaign that visually conveys a social message both here in the United States, as well as globally.

Qualitative Research – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

For your initial reaction post, focus on how heuristics are

 For your initial reaction post, focus on how heuristics are tailored for specific problems. Are there standard heuristics? are there specific ones? why? do they make sense? Is there any heuristic that you would add to any of the papers? is it easy to measure? Do include some of the learning

The Canada-US relationship

Examine the Canada-US relationship. How would you characterize it at present? What are the major challenges? In the age of Trump. What strategy should the canadian government adopt? Is there anything that Canada do that would improve the relationship? Research paper must demonstrate a research capability, argument, and coherent structure.

Review the resources and clinical skills in the Family Nurse

Review the resources and clinical skills in the Family Nurse Practitioner (FNP) Procedures List and Resource Review and FNP Clinical Skills and Procedures Self-Assessment Form or Adult Gerontology Primary Care Nurse Practitioner (AGPCNP) Clinical Skills Resource List and AGPCNP Clinical Skills and Procedures Self-Assessment Form specific to your selected NP track. It is

Suppose you are the manager of a chain restaurant (e.g.,

Suppose you are the manager of a chain restaurant (e.g., Chili’s, The Cheesecake Factory, and so forth) in Los Angeles. The economy is doing poorly, and people are not eating out as much as they used to. If you do not do something to increase revenue or decrease costs, you

Instructions Current Issues Journal You will combine all of your

  Instructions Current Issues Journal  You will combine all of your “three questions” from your Current Issues Article Summaries into one document. These questions will be combined together into a semester-long journal where students will be able to retain their questions, be expected to include their follow up You are

Students are expected to read the scenario materials and produce

 Students are expected to read the scenario materials and produce a one-page summary report of the lessons learned. Students should conclude the report with their own observations, suggestions, and recommendations based on course learning and professional experiences. The reports must be a maximum length of 1 page (single-spaced, 1-inch margins,