SlideShare a Scribd company logo
1 of 1
Download to read offline
1) Name the seven layers of the OSI network model, and 2) enumerate security issues at each
level. I have done the first one for you as an example:
Layer 1 - Physical: theft, bit errors, denial of service, noise, signal errors, RF interference,
removable media, open wall ports, flooding, natural disasters, EMP bomb.
Solution
The seven layers of the OSI model are as follows:
Layer 1-Physical layer: The security issues at this layer are theft, bit errors, denial of service,
noise, signal errors, RF interference, removable media, open wall ports, flooding, natural
disasters, EMP bomb.
Layer 2-Data link layer: The security issues that can occur at this layer are MAC flooding,
disruption in the flow of the data.
Layer 3-Network layer: The security issues are: ICMP Flooding, load on firewall, loss of
confidentiality.
Layer 4-Transport Layer: SYN flood, Smurf Attack,
Layer 5-Session layer: The security issues that can occur at this layer can occur during the inter-
machine communication.
Layer 6-Presentation Layer: The poor handling of input (malicious) can lead to crashes.
Layer 7-Application Layer: This layer is most prevalent to attack by hackers. At this layer, the
entire application can be manipulated, user data can be stolen. It can lead to destruction of the
entire network. This is also known as Denial of Service attack.

More Related Content

Similar to 1) Name the seven layers of the OSI network model, and 2) enumerate .pdf

IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)sequi_inc
 
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2Djadja Sardjana
 
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTUREVULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURENurul Haszeli Ahmad
 
ME Information Security
ME Information SecurityME Information Security
ME Information SecurityMohamed Monsef
 
I030102056063
I030102056063I030102056063
I030102056063theijes
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSMAU
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...IEEEGLOBALSOFTTECHNOLOGIES
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksIEEEFINALYEARPROJECTS
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IPMannu Khani
 
NT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docx
NT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docxNT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docx
NT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docxhenrymartin15260
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAbdelkhalik Mosa
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...IEEEGLOBALSOFTTECHNOLOGIES
 

Similar to 1) Name the seven layers of the OSI network model, and 2) enumerate .pdf (20)

IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
IEEE Standard for Securing Legacy Scada Protocols (Sequi, Inc)
 
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
 
Osi reference
Osi referenceOsi reference
Osi reference
 
Buffer Overflows
Buffer OverflowsBuffer Overflows
Buffer Overflows
 
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTUREVULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE
VULNERABILITIES AND EXPLOITATION IN COMPUTER SYSTEM – PAST, PRESENT, AND FUTURE
 
seminar presentation
seminar presentationseminar presentation
seminar presentation
 
ME Information Security
ME Information SecurityME Information Security
ME Information Security
 
I030102056063
I030102056063I030102056063
I030102056063
 
Web Hacking
Web HackingWeb Hacking
Web Hacking
 
Smau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano ZaneroSmau Bologna 2013 Stefano Zanero
Smau Bologna 2013 Stefano Zanero
 
technical disaster
technical disastertechnical disaster
technical disaster
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from wir...
 
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networksVampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks draining life from wireless ad hoc sensor networks
 
Report of TCP/IP
Report of TCP/IPReport of TCP/IP
Report of TCP/IP
 
OSI model (Tamil)
OSI model (Tamil)OSI model (Tamil)
OSI model (Tamil)
 
Assignment 6
Assignment 6Assignment 6
Assignment 6
 
1st class
1st class1st class
1st class
 
NT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docx
NT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docxNT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docx
NT2580 Week 4 Hardening a NetworkAnalysis 4.2Availability, In.docx
 
Accessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network SecurityAccessing the WAN: Ch4 - Network Security
Accessing the WAN: Ch4 - Network Security
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 

More from isenbergwarne4100

Identify and discuss the two basic principles of assessing risk tole.pdf
Identify and discuss the two basic principles of assessing risk tole.pdfIdentify and discuss the two basic principles of assessing risk tole.pdf
Identify and discuss the two basic principles of assessing risk tole.pdfisenbergwarne4100
 
Help for this question please and have details For the combined ELSI.pdf
Help for this question please and have details For the combined ELSI.pdfHelp for this question please and have details For the combined ELSI.pdf
Help for this question please and have details For the combined ELSI.pdfisenbergwarne4100
 
Explain the underlying reason that cell membranes have a bilayer str.pdf
Explain the underlying reason that cell membranes have a bilayer str.pdfExplain the underlying reason that cell membranes have a bilayer str.pdf
Explain the underlying reason that cell membranes have a bilayer str.pdfisenbergwarne4100
 
Despite the repeated effort by the government to reform how Wall Str.pdf
Despite the repeated effort by the government to reform how Wall Str.pdfDespite the repeated effort by the government to reform how Wall Str.pdf
Despite the repeated effort by the government to reform how Wall Str.pdfisenbergwarne4100
 
Could you please fill this out for Postpartum depressionDirection.pdf
Could you please fill this out for Postpartum depressionDirection.pdfCould you please fill this out for Postpartum depressionDirection.pdf
Could you please fill this out for Postpartum depressionDirection.pdfisenbergwarne4100
 
A university financial aid office polled an SRS of undergraduate stud.pdf
A university financial aid office polled an SRS of undergraduate stud.pdfA university financial aid office polled an SRS of undergraduate stud.pdf
A university financial aid office polled an SRS of undergraduate stud.pdfisenbergwarne4100
 
A confidential and voluntary survey conducted in STA 3024 in the Spr.pdf
A confidential and voluntary survey conducted in STA 3024 in the Spr.pdfA confidential and voluntary survey conducted in STA 3024 in the Spr.pdf
A confidential and voluntary survey conducted in STA 3024 in the Spr.pdfisenbergwarne4100
 
1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdf1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdfisenbergwarne4100
 
8. Eenee, Meanie, and Miney each have a capital balance of $84,000 i.pdf
8. Eenee, Meanie, and Miney each have a capital balance of $84,000 i.pdf8. Eenee, Meanie, and Miney each have a capital balance of $84,000 i.pdf
8. Eenee, Meanie, and Miney each have a capital balance of $84,000 i.pdfisenbergwarne4100
 
[Python] [Singly-linked list] [Element insertion] Consider the follo.pdf
[Python] [Singly-linked list] [Element insertion] Consider the follo.pdf[Python] [Singly-linked list] [Element insertion] Consider the follo.pdf
[Python] [Singly-linked list] [Element insertion] Consider the follo.pdfisenbergwarne4100
 
why Cu, Pb, and Sn were metals used in early civilizations Solu.pdf
why Cu, Pb, and Sn were metals used in early civilizations Solu.pdfwhy Cu, Pb, and Sn were metals used in early civilizations Solu.pdf
why Cu, Pb, and Sn were metals used in early civilizations Solu.pdfisenbergwarne4100
 
Which scenario is the least likely to be supported by the theory of .pdf
Which scenario is the least likely to be supported by the theory of .pdfWhich scenario is the least likely to be supported by the theory of .pdf
Which scenario is the least likely to be supported by the theory of .pdfisenbergwarne4100
 
What is the difference between neurotransmitters and neuropeptides .pdf
What is the difference between neurotransmitters and neuropeptides  .pdfWhat is the difference between neurotransmitters and neuropeptides  .pdf
What is the difference between neurotransmitters and neuropeptides .pdfisenbergwarne4100
 
5) The US government is spying on Switzerland. They believe Switzerl.pdf
5) The US government is spying on Switzerland. They believe Switzerl.pdf5) The US government is spying on Switzerland. They believe Switzerl.pdf
5) The US government is spying on Switzerland. They believe Switzerl.pdfisenbergwarne4100
 
To qualify for the partial exclusion of gain on the sale or exchange.pdf
To qualify for the partial exclusion of gain on the sale or exchange.pdfTo qualify for the partial exclusion of gain on the sale or exchange.pdf
To qualify for the partial exclusion of gain on the sale or exchange.pdfisenbergwarne4100
 
These questions are for Java.1. name of Java class with methods an.pdf
These questions are for Java.1. name of Java class with methods an.pdfThese questions are for Java.1. name of Java class with methods an.pdf
These questions are for Java.1. name of Java class with methods an.pdfisenbergwarne4100
 
The United States Central Intelligence Agency, FBI, and National Sec.pdf
The United States Central Intelligence Agency, FBI, and National Sec.pdfThe United States Central Intelligence Agency, FBI, and National Sec.pdf
The United States Central Intelligence Agency, FBI, and National Sec.pdfisenbergwarne4100
 
The study of consumer choose one brand over another and how they make.pdf
The study of consumer choose one brand over another and how they make.pdfThe study of consumer choose one brand over another and how they make.pdf
The study of consumer choose one brand over another and how they make.pdfisenbergwarne4100
 
Survivin Monomer Plays an Essential Role in Apoptosis Regulation Mar.pdf
Survivin Monomer Plays an Essential Role in Apoptosis Regulation Mar.pdfSurvivin Monomer Plays an Essential Role in Apoptosis Regulation Mar.pdf
Survivin Monomer Plays an Essential Role in Apoptosis Regulation Mar.pdfisenbergwarne4100
 
statistics Which is not true of p-values Select one When they are.pdf
statistics Which is not true of p-values Select one  When they are.pdfstatistics Which is not true of p-values Select one  When they are.pdf
statistics Which is not true of p-values Select one When they are.pdfisenbergwarne4100
 

More from isenbergwarne4100 (20)

Identify and discuss the two basic principles of assessing risk tole.pdf
Identify and discuss the two basic principles of assessing risk tole.pdfIdentify and discuss the two basic principles of assessing risk tole.pdf
Identify and discuss the two basic principles of assessing risk tole.pdf
 
Help for this question please and have details For the combined ELSI.pdf
Help for this question please and have details For the combined ELSI.pdfHelp for this question please and have details For the combined ELSI.pdf
Help for this question please and have details For the combined ELSI.pdf
 
Explain the underlying reason that cell membranes have a bilayer str.pdf
Explain the underlying reason that cell membranes have a bilayer str.pdfExplain the underlying reason that cell membranes have a bilayer str.pdf
Explain the underlying reason that cell membranes have a bilayer str.pdf
 
Despite the repeated effort by the government to reform how Wall Str.pdf
Despite the repeated effort by the government to reform how Wall Str.pdfDespite the repeated effort by the government to reform how Wall Str.pdf
Despite the repeated effort by the government to reform how Wall Str.pdf
 
Could you please fill this out for Postpartum depressionDirection.pdf
Could you please fill this out for Postpartum depressionDirection.pdfCould you please fill this out for Postpartum depressionDirection.pdf
Could you please fill this out for Postpartum depressionDirection.pdf
 
A university financial aid office polled an SRS of undergraduate stud.pdf
A university financial aid office polled an SRS of undergraduate stud.pdfA university financial aid office polled an SRS of undergraduate stud.pdf
A university financial aid office polled an SRS of undergraduate stud.pdf
 
A confidential and voluntary survey conducted in STA 3024 in the Spr.pdf
A confidential and voluntary survey conducted in STA 3024 in the Spr.pdfA confidential and voluntary survey conducted in STA 3024 in the Spr.pdf
A confidential and voluntary survey conducted in STA 3024 in the Spr.pdf
 
1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdf1)Today, the overwhelming world leader in microprocessor sales i.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdf
 
8. Eenee, Meanie, and Miney each have a capital balance of $84,000 i.pdf
8. Eenee, Meanie, and Miney each have a capital balance of $84,000 i.pdf8. Eenee, Meanie, and Miney each have a capital balance of $84,000 i.pdf
8. Eenee, Meanie, and Miney each have a capital balance of $84,000 i.pdf
 
[Python] [Singly-linked list] [Element insertion] Consider the follo.pdf
[Python] [Singly-linked list] [Element insertion] Consider the follo.pdf[Python] [Singly-linked list] [Element insertion] Consider the follo.pdf
[Python] [Singly-linked list] [Element insertion] Consider the follo.pdf
 
why Cu, Pb, and Sn were metals used in early civilizations Solu.pdf
why Cu, Pb, and Sn were metals used in early civilizations Solu.pdfwhy Cu, Pb, and Sn were metals used in early civilizations Solu.pdf
why Cu, Pb, and Sn were metals used in early civilizations Solu.pdf
 
Which scenario is the least likely to be supported by the theory of .pdf
Which scenario is the least likely to be supported by the theory of .pdfWhich scenario is the least likely to be supported by the theory of .pdf
Which scenario is the least likely to be supported by the theory of .pdf
 
What is the difference between neurotransmitters and neuropeptides .pdf
What is the difference between neurotransmitters and neuropeptides  .pdfWhat is the difference between neurotransmitters and neuropeptides  .pdf
What is the difference between neurotransmitters and neuropeptides .pdf
 
5) The US government is spying on Switzerland. They believe Switzerl.pdf
5) The US government is spying on Switzerland. They believe Switzerl.pdf5) The US government is spying on Switzerland. They believe Switzerl.pdf
5) The US government is spying on Switzerland. They believe Switzerl.pdf
 
To qualify for the partial exclusion of gain on the sale or exchange.pdf
To qualify for the partial exclusion of gain on the sale or exchange.pdfTo qualify for the partial exclusion of gain on the sale or exchange.pdf
To qualify for the partial exclusion of gain on the sale or exchange.pdf
 
These questions are for Java.1. name of Java class with methods an.pdf
These questions are for Java.1. name of Java class with methods an.pdfThese questions are for Java.1. name of Java class with methods an.pdf
These questions are for Java.1. name of Java class with methods an.pdf
 
The United States Central Intelligence Agency, FBI, and National Sec.pdf
The United States Central Intelligence Agency, FBI, and National Sec.pdfThe United States Central Intelligence Agency, FBI, and National Sec.pdf
The United States Central Intelligence Agency, FBI, and National Sec.pdf
 
The study of consumer choose one brand over another and how they make.pdf
The study of consumer choose one brand over another and how they make.pdfThe study of consumer choose one brand over another and how they make.pdf
The study of consumer choose one brand over another and how they make.pdf
 
Survivin Monomer Plays an Essential Role in Apoptosis Regulation Mar.pdf
Survivin Monomer Plays an Essential Role in Apoptosis Regulation Mar.pdfSurvivin Monomer Plays an Essential Role in Apoptosis Regulation Mar.pdf
Survivin Monomer Plays an Essential Role in Apoptosis Regulation Mar.pdf
 
statistics Which is not true of p-values Select one When they are.pdf
statistics Which is not true of p-values Select one  When they are.pdfstatistics Which is not true of p-values Select one  When they are.pdf
statistics Which is not true of p-values Select one When they are.pdf
 

Recently uploaded

Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppCeline George
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................MirzaAbrarBaig5
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital ManagementMBA Assignment Experts
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....Ritu480198
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjMohammed Sikander
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportDenish Jangid
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint23600690
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code ExamplesPeter Brusilovsky
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...Nguyen Thanh Tu Collection
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...Gary Wood
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSAnaAcapella
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17Celine George
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...EduSkills OECD
 

Recently uploaded (20)

Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 

1) Name the seven layers of the OSI network model, and 2) enumerate .pdf

  • 1. 1) Name the seven layers of the OSI network model, and 2) enumerate security issues at each level. I have done the first one for you as an example: Layer 1 - Physical: theft, bit errors, denial of service, noise, signal errors, RF interference, removable media, open wall ports, flooding, natural disasters, EMP bomb. Solution The seven layers of the OSI model are as follows: Layer 1-Physical layer: The security issues at this layer are theft, bit errors, denial of service, noise, signal errors, RF interference, removable media, open wall ports, flooding, natural disasters, EMP bomb. Layer 2-Data link layer: The security issues that can occur at this layer are MAC flooding, disruption in the flow of the data. Layer 3-Network layer: The security issues are: ICMP Flooding, load on firewall, loss of confidentiality. Layer 4-Transport Layer: SYN flood, Smurf Attack, Layer 5-Session layer: The security issues that can occur at this layer can occur during the inter- machine communication. Layer 6-Presentation Layer: The poor handling of input (malicious) can lead to crashes. Layer 7-Application Layer: This layer is most prevalent to attack by hackers. At this layer, the entire application can be manipulated, user data can be stolen. It can lead to destruction of the entire network. This is also known as Denial of Service attack.