Preview

Osi Layers

Good Essays
Open Document
Open Document
597 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Osi Layers
The OSI model has seven layers, with each having different types of security responsibilities. The seven layers are application, presentation, session, transport, network, datalink and physical with control being passed down from layer to layer starting with application. The biggest threat to these layers is through people, sometimes known as the 8th layer of the OSI model.
Companies should take the time to educate their employees on the security threats that each individual brings to the company. Throwing personal information into a dumpster and not shredding this information is a huge security risk. Each individual is given a password to access the system for his or her job and should never reveal their password to anyone. Employee’s must keep in mind that anything done under their login and password is considered that persons responsibility and therefore, by keeping their password safe, it eliminates the possibility of someone else using his or her log-in for malicious purposes.
The first real layer of the OSI level is the application layer. It includes software such as File Transfer Protocol (FTP), telnet, DNS, HTTP. FTP is used to move files from one system to another and is at high risk for hacking. More secure FTP programs exist today called FTP over SSL and FTP over SSH. All Banks use the more secure FTP programs to do EFT transfers. When using telnet a company should require a login and password even if they allow anonymous connections. Telnet transfers in clear text which can allow a hacker to read the clear text as it goes over the network. DNS is an application that translates addresses as they come in, if they are not configured correctly a full zone transfer. HTTP security issues revolve around that fact that hackers can get to the web server and create a backdoor. HTTP’s were introduced to stop this back door from happening.
Data Line Layer “responds to service requests from the network layer and issues service requests to the physical

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Studying the seven layers of the OSI design, a decision to be taken is that the layer three, also referred to as the network layer is the one which WAN protocols operates on. The network layer carries out regular tasks as well as pinpoints end-to-end addressing and routing datagrams (Regan, 2004). There exists a unit known as brouter that some layers incorporate which works like a router and a bridge. Routers and switches work on layers 2-4 (data link layer, network layer as well as transport layer). As mentioned earlier, on layer two of the OSI model, network layer, is the place where the addressing and routing is carried out. On the transport layer of the OSI model is the place where the flow control and mistake handling works. Lastly, on layer four the synchronizations and assemblies are completed.…

    • 254 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    Combines layers 5, 6 and 7: provides network services such as email, file transfers, exchanges of data, support connections between sessions and inner host communications…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt2799 Oral Exam

    • 7416 Words
    • 38 Pages

    a. Layer 1: The physical layer...This layer conveys the bit stream through the network at the electrical and mechanical…

    • 7416 Words
    • 38 Pages
    Powerful Essays
  • Better Essays

    Nt1310 Unit 3 Assignment 1

    • 3788 Words
    • 16 Pages

    With security mechanisms for the new network, management has asked for a report describing how the basics of a network operate and how two nodes communicate. With this we are going to break down the OSI model (Open Systems Interconnection) which is seven layers along with the TCP/IP (Transmission Control Protocol/Internet Protocol). After this the management team will know the difference between the two models along with some other key information.…

    • 3788 Words
    • 16 Pages
    Better Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    8. The TCP/IP and OSI models have some obvious differences, like the number of layers. Think about the more commonly used version of the TCP/IP model discussed in this chapter, and then think about how to talk about TCP/IP using OSI…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    This layer holds whatever IP will run above, e.g., Ethernet, token-ring, and Fiber Distributed Digital Interface (FDDI) systems. Distinct network protocols, e.g., Ethernet, exertion at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1210 Lab 3.1 Review

    • 505 Words
    • 3 Pages

    The OSI model is not directly implemented in networking and often the distinction between the layers will blur in implementation. Why does it endure despite these issues? Use your textbook and Internet research to justify your answer.…

    • 505 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Webopedia.com, (2010). The 7 Layers of the OSI Model. Retrieved on Wednesday, October 20, 2010, from http://www.webopedia.com/quick_ref/OSI_Layers.asp…

    • 1324 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    When developing a multi-layered security plan, you must look at each of the seven domains of the IT infrastructure and increase security on each of those domains. The seven domains are user domain, workstation domain, LAN domain, LAN to WAN domain, WAN domain, and remote access domain. Increasing the security on each of those seven domains will increase the overall security of the system and create a multi-layered security plan.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Consumer or user loosing data permanently is the last thing that a company can afford in enterprise scale. Phishing, taking Advantage of software loop holes, password loss can all lead to loss of control over the user information. Most security measure being refraining from sharing credentials between users and use a strong encryption -Decryption while exchanging critical…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7

    • 2452 Words
    • 10 Pages

    5. What are the seven layers of the OSI model (in order)? What is the role of each layer?…

    • 2452 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    nt1210

    • 831 Words
    • 4 Pages

    Define each layer of the OSI model in your own words and state what each layer provides. Use your textbook or internet research to support your answer.…

    • 831 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 9 L3 BTEC IT P2

    • 339 Words
    • 2 Pages

    The open system interconnect (OSI) mdel has seven layers for communication and network protocols. The layers consist of presentation, application, session, transport, data, network and physical. These standards are the platform from which computers communicate. During this communication certain rules must be followed by the sender and the recipient for the communication to be successful.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Hsc300 Week 2 Assignment

    • 866 Words
    • 4 Pages

    This week we covered some additional information in regards to the data layer, more specifically the MAC layer, and went into the network layer of the OSI model. As part of that we discussed different routing protocols and systems.…

    • 866 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Throughout the history of networking, one model has stood the test of time for providing not only insight, but also a foundation by which all networking systems utilize in some form or fashion. The seven layers of the OSI model, which stands for Open System Interconnect, are: Application, Presentation, Session, Transport, Network, Data link, and Physical. These layers are the framework for networking, because they represent the roadmap, rules, and process that every message must adhere to when it is sent across networks. Just as a package is sent from UPS or Fed-Ex with a routing number, a sender, a receiver, an address, and many other things that are involved with the delivery of the package, the same principles can be applied to networking messages or packets by using the OSI model. The Session layer of the OSI Model, “Provides the control functions necessary to establish, manage, and terminate the connections as required to satisfy the user requests,” (Beasley 123). This layer is in direct contact with the user through the different interfaces and the connections can be managed and manipulated in many different ways. For instance if I wanted to terminate my connection because of a severe thunderstorm there are a bunch of ways I could do that. I could pull the plugs; I could disable the router then power it down and power down my switch and then power down the rest of my network. If I operated ITT-Tech’s network and in order to control the employees’ use of the internet and to keep them working, I could put a filter using barracuda on all websites that wouldn’t pertain to work related subjects. It would manage their use of the network and keep them focused on their work. These are just several examples of the Session layer of the OSI Model in action.…

    • 1514 Words
    • 7 Pages
    Best Essays