1 page/≈275 words
IT & Computer Science
Threats in OSI Model Research Any Type Of Security (Essay Sample)
Threats in OSI Modelsource..
Threats in OSI Model
Name of Institution
Threats in OSI Model
When OSI model was introduced, there was no thinking of any type of security. Hence, there is no security in the OSI model and to be fair, there wasn't in the TCP/IP model either. Here are threats in each security layer of OSI Model.
1.The Physical Layer
Security in the physical layer has a threat due to accidental or malicious intent or environmental factors like power surges (Finjan Team). Attackers mostly target to stop network signals by switching off a piece of network equipment.
2.The Data Link Layer
It makes attempts to pass virtual Local Area Network or VLAN security protocols or MAC addresses which are its usual weakness as a layer. In other case frame headers are used to overflow non-switched segments and then through them network band width is used.
3.The Network Layer
Content coming from malicious sources is re-organized by attackers in such a way that it looks like coming from authentic sources and gets access to the network.
4.The Transport Layer
SYN attack is common term used for transport layer. In this attack SYN packets are charged to overflow memory requirements that makes receiving device unavailable.
5.The Session Layer
Since it creates and terminates connections, attempts are made to access it and if authentication protocols are weak then they are resulted into successful ones. Timers should be placed to limit number of attempts that may be made to establish a session (Finjan Team).
6.The Presentation Layer
Malicious inputs are made during conversion of data that might lead to system crashes or exploits
7.Application Layer Attack
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
- Network Security, Personal Data To Store, Potential ClientsDescription: Network security is a big concern for the companies whom have large amount of personal data to store for their potential clients. Here is a list of few suggestions which should be used by companies in order to prevent loss...1 page/≈275 words| 1 Source | APA | IT & Computer Science | Essay |
- Data Privacy: The Seven Glоbal Privacy PrinciplesDescription: Write a рaрer that disсusses the seven glоbal privacy principles that most companies have included in their self-regulation for data privacy. Why do companies include them?...2 pages/≈550 words| 2 Sources | APA | IT & Computer Science | Essay |
- Discussion Post #1: Media effect in Hegemony and ChangeDescription: The media has affected dominance (hegemony) and change in culture(Vianney, 2015). This paper focuses on the TED talk by Johanna Blakley on social media regarding gender. ...1 page/≈275 words| 5 Sources | APA | IT & Computer Science | Essay |