SlideShare a Scribd company logo
Many of you have learned about the OSI and many do not get
how this is applicable beyond foundational knowledge. I would
like you to take another look at the OSI model and each layer
discuss a possible security risk you see in each layer. You will
see a common theme by the end of the discussion.
Example: Use only as example!
This week we discuss the security vulnerabilities that are found
in each layer of the OSI model. The physical layer is up first.
Vulnerabilities in the physical layer have been discussed
extensively in previous weeks. One possible security risk is for
an adversary to infect a USB drive and then physically plug it in
to a networked device.
The next layer is the data link layer. It is the layer responsible
for the transmission of data between nodes. A security threat in
this layer would be for a potential adversary to corrupt or alter
data that is about to be sent through the node. This would
subsequently alter the data that is transmitted form its original
and intended form.
The network layer is responsible for routing messages through
different networks. A vulnerability here could be a data worm
that has infected a device in one network, being transported via
the network layer to another network. The worm will then be
able to infect the devices within the new network.
The transport layer is the first in the upper layer and is
responsible for breaking messages down in to pieces before
sending them onward. A potential vulnerability here is for the
interception of unencrypted messages being sent through the
transport layer by an adversary.
Session layer is next and is responsible for passwords
exchanges, log offs, and termination of connections. A
vulnerability here would be an adversary keeping the gateway
open and preventing the session layer from terminating the
connection. This would allow the adversary access to the data
protected beyond the password gateway.
The presentation layer provides conversion service which cause
character change sequences. A vulnerability here could be an
adversary corrupting the change sequence which would produce
the incorrect data once it has been converted.
The final layer, the application layer is the layer most
responsible for communication of the various applications being
utilized. One of the vulnerabilities present here would be the
potential for a virus to cause the application layer to redirect
data that flows through it.
One of the common themes I see running through here is the
spread of corruption and viruses. Each layer has the potential
to spread malicious content. The conclusion this brings me to is
that each layer must be properly defended with modern security
protocols.
Jacobs, S. (2015)
Engineering Information Security : The Application of Systems
Engineering Concepts to Achieve Information Assurance

More Related Content

Similar to Many of you have learned about the OSI and many do not get how this .docx

The Osi Model
The Osi ModelThe Osi Model
The Osi Model
Amit Pandey
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
IJNSA Journal
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
IJNSA Journal
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
Ii3415521555
Ii3415521555Ii3415521555
Ii3415521555
IJERA Editor
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
IOSR Journals
 
B017130508
B017130508B017130508
B017130508
IOSR Journals
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
pijans
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Dr.Irshad Ahmed Sumra
 
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxRunning Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
todd521
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
Nitesh Dubey
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
IJCNCJournal
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...
Alexander Decker
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...
Alexander Decker
 
Firewall
FirewallFirewall
Firewall
FirewallFirewall
Iso model
Iso modelIso model
Iso model
AbinayaP9
 
Osi model
Osi modelOsi model
Osi model
MdMizanurRahma18
 
Networking overview
Networking overviewNetworking overview
Networking overview
maxminhaj1
 
Osi model
Osi modelOsi model
Osi model
yjartes
 

Similar to Many of you have learned about the OSI and many do not get how this .docx (20)

The Osi Model
The Osi ModelThe Osi Model
The Osi Model
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
 
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKSRTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
RTOS BASED SECURE SHORTEST PATH ROUTING ALGORITHM IN MOBILE AD- HOC NETWORKS
 
G011123539
G011123539G011123539
G011123539
 
Ii3415521555
Ii3415521555Ii3415521555
Ii3415521555
 
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc NetworksProviding The Security Against The DDOS Attack In Mobile Ad Hoc Networks
Providing The Security Against The DDOS Attack In Mobile Ad Hoc Networks
 
B017130508
B017130508B017130508
B017130508
 
A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)A comparitive analysis of wireless security protocols (wep and wpa2)
A comparitive analysis of wireless security protocols (wep and wpa2)
 
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANETDenial of Service (DOS) Attack and Its Possible Solutions in VANET
Denial of Service (DOS) Attack and Its Possible Solutions in VANET
 
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docxRunning Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
Running Head THE SEVEN LAYER MODEL OF OSIKao 1THE SEVEN LAYE.docx
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...
 
Firewall
FirewallFirewall
Firewall
 
Firewall
FirewallFirewall
Firewall
 
Iso model
Iso modelIso model
Iso model
 
Osi model
Osi modelOsi model
Osi model
 
Networking overview
Networking overviewNetworking overview
Networking overview
 
Osi model
Osi modelOsi model
Osi model
 

More from LaticiaGrissomzz

MGMT665, MBA CapstoneLive Chat #3 Focus on Organizatio.docx
MGMT665, MBA CapstoneLive Chat #3  Focus on Organizatio.docxMGMT665, MBA CapstoneLive Chat #3  Focus on Organizatio.docx
MGMT665, MBA CapstoneLive Chat #3 Focus on Organizatio.docx
LaticiaGrissomzz
 
MEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docx
MEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docxMEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docx
MEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docx
LaticiaGrissomzz
 
Mass MurderersIn the aftermath of mass murders, the news media a.docx
Mass MurderersIn the aftermath of mass murders, the news media a.docxMass MurderersIn the aftermath of mass murders, the news media a.docx
Mass MurderersIn the aftermath of mass murders, the news media a.docx
LaticiaGrissomzz
 
Marketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docx
Marketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docxMarketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docx
Marketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docx
LaticiaGrissomzz
 
MGT 4337 Business Policy and Decision Making Module 3 .docx
MGT 4337 Business Policy and Decision Making        Module 3 .docxMGT 4337 Business Policy and Decision Making        Module 3 .docx
MGT 4337 Business Policy and Decision Making Module 3 .docx
LaticiaGrissomzz
 
MedWatch The FDA Safety Information and Adverse Event Reporting.docx
MedWatch The FDA Safety Information and Adverse Event Reporting.docxMedWatch The FDA Safety Information and Adverse Event Reporting.docx
MedWatch The FDA Safety Information and Adverse Event Reporting.docx
LaticiaGrissomzz
 
Mass Murderers and Serial KillersReview the two case studies out.docx
Mass Murderers and Serial KillersReview the two case studies out.docxMass Murderers and Serial KillersReview the two case studies out.docx
Mass Murderers and Serial KillersReview the two case studies out.docx
LaticiaGrissomzz
 
Memorandum of Understanding The Norwalk Agreement” .docx
Memorandum of Understanding The Norwalk Agreement” .docxMemorandum of Understanding The Norwalk Agreement” .docx
Memorandum of Understanding The Norwalk Agreement” .docx
LaticiaGrissomzz
 
Minimum of 200 words Briefly share a situation in which you h.docx
Minimum of 200 words Briefly share a situation in which you h.docxMinimum of 200 words Briefly share a situation in which you h.docx
Minimum of 200 words Briefly share a situation in which you h.docx
LaticiaGrissomzz
 
MGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docx
MGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docxMGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docx
MGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docx
LaticiaGrissomzz
 
Meeting or Beating Analyst Expectations in thePost-Scandals .docx
Meeting or Beating Analyst Expectations in thePost-Scandals .docxMeeting or Beating Analyst Expectations in thePost-Scandals .docx
Meeting or Beating Analyst Expectations in thePost-Scandals .docx
LaticiaGrissomzz
 
Mental Status ExaminationThe patient is who is 70 years old who.docx
Mental Status ExaminationThe patient is who is 70 years old who.docxMental Status ExaminationThe patient is who is 70 years old who.docx
Mental Status ExaminationThe patient is who is 70 years old who.docx
LaticiaGrissomzz
 
MEMODate SEPTEMBER 29, 2022 To CITY OF COLUMBUS MA.docx
MEMODate     SEPTEMBER 29, 2022 To       CITY OF COLUMBUS MA.docxMEMODate     SEPTEMBER 29, 2022 To       CITY OF COLUMBUS MA.docx
MEMODate SEPTEMBER 29, 2022 To CITY OF COLUMBUS MA.docx
LaticiaGrissomzz
 
Memo ToSally JonesFromJames StudentDate Ja.docx
Memo        ToSally JonesFromJames StudentDate Ja.docxMemo        ToSally JonesFromJames StudentDate Ja.docx
Memo ToSally JonesFromJames StudentDate Ja.docx
LaticiaGrissomzz
 
Metabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docx
Metabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docxMetabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docx
Metabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docx
LaticiaGrissomzz
 
McDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docx
McDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docxMcDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docx
McDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docx
LaticiaGrissomzz
 
may use One of the following formats for reflection.; all conc.docx
may use One of the following formats for reflection.; all conc.docxmay use One of the following formats for reflection.; all conc.docx
may use One of the following formats for reflection.; all conc.docx
LaticiaGrissomzz
 
master budget problem. only part B  in attached filePa.docx
master budget problem. only part B  in attached filePa.docxmaster budget problem. only part B  in attached filePa.docx
master budget problem. only part B  in attached filePa.docx
LaticiaGrissomzz
 
MAT 133 Milestone One Guidelines and Rubric Overview .docx
MAT 133 Milestone One Guidelines and Rubric Overview .docxMAT 133 Milestone One Guidelines and Rubric Overview .docx
MAT 133 Milestone One Guidelines and Rubric Overview .docx
LaticiaGrissomzz
 
Master of Business Analytics BUS5AP .docx
Master of Business Analytics                          BUS5AP .docxMaster of Business Analytics                          BUS5AP .docx
Master of Business Analytics BUS5AP .docx
LaticiaGrissomzz
 

More from LaticiaGrissomzz (20)

MGMT665, MBA CapstoneLive Chat #3 Focus on Organizatio.docx
MGMT665, MBA CapstoneLive Chat #3  Focus on Organizatio.docxMGMT665, MBA CapstoneLive Chat #3  Focus on Organizatio.docx
MGMT665, MBA CapstoneLive Chat #3 Focus on Organizatio.docx
 
MEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docx
MEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docxMEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docx
MEDICAL IMAGING THROUGH HEALTHCARE 17MEDICAL IMAGING THRO.docx
 
Mass MurderersIn the aftermath of mass murders, the news media a.docx
Mass MurderersIn the aftermath of mass murders, the news media a.docxMass MurderersIn the aftermath of mass murders, the news media a.docx
Mass MurderersIn the aftermath of mass murders, the news media a.docx
 
Marketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docx
Marketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docxMarketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docx
Marketing Plan Goals, Objectives, and Strategy WorksheetIII.M.docx
 
MGT 4337 Business Policy and Decision Making Module 3 .docx
MGT 4337 Business Policy and Decision Making        Module 3 .docxMGT 4337 Business Policy and Decision Making        Module 3 .docx
MGT 4337 Business Policy and Decision Making Module 3 .docx
 
MedWatch The FDA Safety Information and Adverse Event Reporting.docx
MedWatch The FDA Safety Information and Adverse Event Reporting.docxMedWatch The FDA Safety Information and Adverse Event Reporting.docx
MedWatch The FDA Safety Information and Adverse Event Reporting.docx
 
Mass Murderers and Serial KillersReview the two case studies out.docx
Mass Murderers and Serial KillersReview the two case studies out.docxMass Murderers and Serial KillersReview the two case studies out.docx
Mass Murderers and Serial KillersReview the two case studies out.docx
 
Memorandum of Understanding The Norwalk Agreement” .docx
Memorandum of Understanding The Norwalk Agreement” .docxMemorandum of Understanding The Norwalk Agreement” .docx
Memorandum of Understanding The Norwalk Agreement” .docx
 
Minimum of 200 words Briefly share a situation in which you h.docx
Minimum of 200 words Briefly share a situation in which you h.docxMinimum of 200 words Briefly share a situation in which you h.docx
Minimum of 200 words Briefly share a situation in which you h.docx
 
MGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docx
MGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docxMGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docx
MGT576 v1Learning OrganizationsMGT576 v1Page 3 of 3Lea.docx
 
Meeting or Beating Analyst Expectations in thePost-Scandals .docx
Meeting or Beating Analyst Expectations in thePost-Scandals .docxMeeting or Beating Analyst Expectations in thePost-Scandals .docx
Meeting or Beating Analyst Expectations in thePost-Scandals .docx
 
Mental Status ExaminationThe patient is who is 70 years old who.docx
Mental Status ExaminationThe patient is who is 70 years old who.docxMental Status ExaminationThe patient is who is 70 years old who.docx
Mental Status ExaminationThe patient is who is 70 years old who.docx
 
MEMODate SEPTEMBER 29, 2022 To CITY OF COLUMBUS MA.docx
MEMODate     SEPTEMBER 29, 2022 To       CITY OF COLUMBUS MA.docxMEMODate     SEPTEMBER 29, 2022 To       CITY OF COLUMBUS MA.docx
MEMODate SEPTEMBER 29, 2022 To CITY OF COLUMBUS MA.docx
 
Memo ToSally JonesFromJames StudentDate Ja.docx
Memo        ToSally JonesFromJames StudentDate Ja.docxMemo        ToSally JonesFromJames StudentDate Ja.docx
Memo ToSally JonesFromJames StudentDate Ja.docx
 
Metabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docx
Metabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docxMetabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docx
Metabolic acidosis A decrease in serum HCO3 of less than 24 mEqL.docx
 
McDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docx
McDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docxMcDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docx
McDonald’s—The Coffee Spill Heard ’Round the WorldThe McDonald’s.docx
 
may use One of the following formats for reflection.; all conc.docx
may use One of the following formats for reflection.; all conc.docxmay use One of the following formats for reflection.; all conc.docx
may use One of the following formats for reflection.; all conc.docx
 
master budget problem. only part B  in attached filePa.docx
master budget problem. only part B  in attached filePa.docxmaster budget problem. only part B  in attached filePa.docx
master budget problem. only part B  in attached filePa.docx
 
MAT 133 Milestone One Guidelines and Rubric Overview .docx
MAT 133 Milestone One Guidelines and Rubric Overview .docxMAT 133 Milestone One Guidelines and Rubric Overview .docx
MAT 133 Milestone One Guidelines and Rubric Overview .docx
 
Master of Business Analytics BUS5AP .docx
Master of Business Analytics                          BUS5AP .docxMaster of Business Analytics                          BUS5AP .docx
Master of Business Analytics BUS5AP .docx
 

Recently uploaded

How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 

Recently uploaded (20)

How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 

Many of you have learned about the OSI and many do not get how this .docx

  • 1. Many of you have learned about the OSI and many do not get how this is applicable beyond foundational knowledge. I would like you to take another look at the OSI model and each layer discuss a possible security risk you see in each layer. You will see a common theme by the end of the discussion. Example: Use only as example! This week we discuss the security vulnerabilities that are found in each layer of the OSI model. The physical layer is up first. Vulnerabilities in the physical layer have been discussed extensively in previous weeks. One possible security risk is for an adversary to infect a USB drive and then physically plug it in to a networked device. The next layer is the data link layer. It is the layer responsible for the transmission of data between nodes. A security threat in this layer would be for a potential adversary to corrupt or alter data that is about to be sent through the node. This would subsequently alter the data that is transmitted form its original and intended form. The network layer is responsible for routing messages through different networks. A vulnerability here could be a data worm that has infected a device in one network, being transported via the network layer to another network. The worm will then be able to infect the devices within the new network. The transport layer is the first in the upper layer and is responsible for breaking messages down in to pieces before sending them onward. A potential vulnerability here is for the interception of unencrypted messages being sent through the transport layer by an adversary.
  • 2. Session layer is next and is responsible for passwords exchanges, log offs, and termination of connections. A vulnerability here would be an adversary keeping the gateway open and preventing the session layer from terminating the connection. This would allow the adversary access to the data protected beyond the password gateway. The presentation layer provides conversion service which cause character change sequences. A vulnerability here could be an adversary corrupting the change sequence which would produce the incorrect data once it has been converted. The final layer, the application layer is the layer most responsible for communication of the various applications being utilized. One of the vulnerabilities present here would be the potential for a virus to cause the application layer to redirect data that flows through it. One of the common themes I see running through here is the spread of corruption and viruses. Each layer has the potential to spread malicious content. The conclusion this brings me to is that each layer must be properly defended with modern security protocols. Jacobs, S. (2015) Engineering Information Security : The Application of Systems Engineering Concepts to Achieve Information Assurance