... middle of paper ...
...ng for work this is also one type of risk it is good until we handle when we cannot handle then there will be a risk but it is convenient so we are using. Coming to the threats I had come in-detail about denial of service, unauthorized access and many more. Coming to the part of firewalls which will be useful in our personal lives so that we can have an advantage of choosing the best one. We had come across types of firewalls and there advantages and which is best one. Coming to the secure devices we had learned about dial back systems, virtual private networks. Coming to the attacks I had learned about Trojan horses, software bugs, sniffers. There are many businesses depended on this network security like online banking, business processes etc. I had also got an idea on hacking and in what ways they hack. Everyone in the organization is responsible for the security.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Executive Summary This report is a response to an individual assignment to partially fulfill the requirements of (TN6384 Computer Network) module. It aims to shed the light on the Network, transport, and application-layer protocols of OSI Model. The report begins with presenting a relevant background to the topic, presenting the historical perspective of OSI protocols. In addition, it explains the purpose and importance of these protocols. Furthermore, it discusses functions and tasks achieved by the seven layers of OSI models followed by presenting the corresponding protocols associated with each layer.... [tags: computer science and data management]
2243 words (6.4 pages)
- 1-Describe the 7-layer OSI network reference model. List all 7 components. The 7-layer OSI network reference model delineates a hierarchy of abstract building blocks that provide basic protocols and services in a logically separated manner for the standardization of networks (Serpanos & Wolf, 2011; Cowley, 2012; Egyedi, 1997). The OSI network reference model was developed by the International Organization for Standardization (ISO) to facilitate communication between networks by keeping certain standards open rather than proprietary (Serpanos & Wolf, 2011).... [tags: OSI model, OSI protocols, Data Link Layer]
953 words (2.7 pages)
- The OSI model is a model of how a network actually works. The OSI model has seven different layers and is of course, theoretical. Meaning, this model may not be true in every instance, perhaps it can work without a counter part or perhaps not. The layers of the OSI are comprised of these layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application (InetDaemon, 2015). The Physical Layer is the layer that is responsible for the hardwired connection, this is in charge of the cables and device layouts (Tetz, 2011).... [tags: OSI model, Internet Protocol Suite]
741 words (2.1 pages)
- OSI Model and Security The Open Systems Interconnection Model is a conceptual model describing how any combination of devices can are connected for the purpose of network communication and troubleshooting (Panko & Panko, 2015). Comparing the OSI model’s layers to the levels of application security will shed light on application vulnerabilities. Layer 1 of the OSI model is the Physical Layer. At this layer the OSI model focuses on wires, signals, and repeaters. The security threats are inadequate power, unrestricted access and open wall ports (Holl, 2003).... [tags: OSI model, OSI protocols, Internet Protocol Suite]
774 words (2.2 pages)
- 1.4 – Reference Models Section 1.4 is basically the author telling us about two important network architectures, the OSI reference model and the TCP/IP reference model. The OSI (Open Systems Interconnection) deals with connecting opens systems, which are systems that talk with other systems. This model has seven layers: the physical layer, the data link layer, the network layer, the transport layer, the session layer, the presentation layer, and the application layer. From this information, we discover that the OSI model is used only for its model (the 7 layers) and not as a network architecture since it doesn’t specify the exact services and protocols to be used in each layer.... [tags: OSI model, Internet Protocol Suite]
850 words (2.4 pages)
- The OSI model contains up to 7 separate with their own jobs. The layer above is dependant on the layer below to function. If any errors occur on the layers below the higher layers will not be able to function/communication. TCP/IP is a common protocol on the third layer - the Network layer. If the Physical layer is not functioning correctly TCP/IP will not function. It is best to troubleshoot at layer one and move up the list due to the high dependence of the higher layers towards the lower layers.... [tags: OSI model, OSI protocols, Session Layer]
1075 words (3.1 pages)
- The OSI Model and The Pony Express The Open Systems Interconnection (OSI) reference model is essential to the world of computer networking. The model was created in 1977 by the International Standards Committee, in response to a difficulty that was facing computer networkers at the time (Shelly, Cashman, and Serwatka 142). In order to understand the difficulty, one must first realize that computer networks consist of computer hardware, the software that is to be used in conjunction with this hardware, and the medium (such as wiring or cabling) that will interconnect the computing devices that are in the network.... [tags: Essays Papers]
2842 words (8.1 pages)
- Abstract The Open Systems Interconnect (OSI) model is a standard reference model for the communication between two end users. Seven different layers make up the OSI model: physical, data link, network, transport, session, presentation, and application. This paper will cover the type of security that is associated with each level of the OSI model. Physical Layer The physical layer is where the actual communication occurs between devices. The security of the physical layer pertains to the actual hardware.... [tags: Networks Telecommunications]
1586 words (4.5 pages)
- Security and the OSI Model Network security is a topic that reaches far beyond the realm of firewalls, passwords, and user ID accounts. For a network and data to remain secure there must be protective measures at each level in the OSI interconnect model. While each layer basically operates autonomously of the other it is important to ensure that the data being transmitted from the host to destination has not been tampered with or is being prevented from reaching its destination. There are seven level to the OSI interconnect model; each with its own special tasks, abilities, and weaknesses.... [tags: Security Network]
1411 words (4 pages)
- Michael Rauseo IT310 OSI Model In the early years of computer and network research and development many systems were designed by a number of companies. Although each system had its rights and were sold across the world, it became apparent as network usage grew, that it was difficult, to enable all of these systems to communicate with each other. In the early 1980s, the International Organization for Standardization (ISO) recognized the need for a network model that would help companies create common network implementations.... [tags: essays research papers]
1018 words (2.9 pages)