SlideShare a Scribd company logo
1) Name the seven layers of the OSI network model, and 2) enumerate security issues at each
level. I have done the first one for you as an example:
Layer 1 - Physical: theft, bit errors, denial of service, noise, signal errors, RF interference,
removable media, open wall ports, flooding, natural disasters, EMP bomb.
Solution
The seven layers of the OSI model are as follows:
Layer 1-Physical layer: The security issues at this layer are theft, bit errors, denial of service,
noise, signal errors, RF interference, removable media, open wall ports, flooding, natural
disasters, EMP bomb.
Layer 2-Data link layer: The security issues that can occur at this layer are MAC flooding,
disruption in the flow of the data.
Layer 3-Network layer: The security issues are: ICMP Flooding, load on firewall, loss of
confidentiality.
Layer 4-Transport Layer: SYN flood, Smurf Attack,
Layer 5-Session layer: The security issues that can occur at this layer can occur during the inter-
machine communication.
Layer 6-Presentation Layer: The poor handling of input (malicious) can lead to crashes.
Layer 7-Application Layer: This layer is most prevalent to attack by hackers. At this layer, the
entire application can be manipulated, user data can be stolen. It can lead to destruction of the
entire network. This is also known as Denial of Service attack.

More Related Content

PPTX
seminar presentation
PPTX
Security Threats at OSI layers
PDF
ISO layer
PPT
Cryptography - Unit I | Introduction to Security Concepts
PPTX
Unit-1.pptx Distributed system ppt all info
PPTX
ISO OSI Model (Infosec perspective)
PDF
1. Answer the following questions about OSI modela.At which layer.pdf
PPTX
Network Security and Cryptography
seminar presentation
Security Threats at OSI layers
ISO layer
Cryptography - Unit I | Introduction to Security Concepts
Unit-1.pptx Distributed system ppt all info
ISO OSI Model (Infosec perspective)
1. Answer the following questions about OSI modela.At which layer.pdf
Network Security and Cryptography

Similar to 1) Name the seven layers of the OSI network model, and 2) enumerate .pdf (20)

PPTX
Domain 4 - Communications and Network Security
PPTX
Osi security architecture in network.pptx
DOCX
University of maryland infa 620 homework help
PPT
OSI(Open System Interconnection) model
PPTX
Sapna ppt
PPTX
network security, group policy and firewalls
PDF
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
PPT
C&NS_FIREWALLS.ppt
PPTX
I MSc CS CNS Day 1.pptx
PPTX
osi model ppt (1).pptx
PPTX
network security chapter six for sybbaca
PPTX
OSI Model
PPTX
Osi model
PDF
Network security main
PPTX
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
PDF
Lec 01.pdf
PPTX
BAPANKAR15800121011 SOFT.pptx
PPTX
OSI Model - Open Systems Interconnection
PDF
Information Security _Previous_Question paper
PPTX
OSI layers
Domain 4 - Communications and Network Security
Osi security architecture in network.pptx
University of maryland infa 620 homework help
OSI(Open System Interconnection) model
Sapna ppt
network security, group policy and firewalls
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
C&NS_FIREWALLS.ppt
I MSc CS CNS Day 1.pptx
osi model ppt (1).pptx
network security chapter six for sybbaca
OSI Model
Osi model
Network security main
Unit 4 ec8702 - ad hoc and wireless sensor networks unit -4 mr.darwin nesaku...
Lec 01.pdf
BAPANKAR15800121011 SOFT.pptx
OSI Model - Open Systems Interconnection
Information Security _Previous_Question paper
OSI layers

More from isenbergwarne4100 (20)

PDF
Identify and discuss the two basic principles of assessing risk tole.pdf
PDF
Help for this question please and have details For the combined ELSI.pdf
PDF
Explain the underlying reason that cell membranes have a bilayer str.pdf
PDF
Despite the repeated effort by the government to reform how Wall Str.pdf
PDF
Could you please fill this out for Postpartum depressionDirection.pdf
PDF
A university financial aid office polled an SRS of undergraduate stud.pdf
PDF
A confidential and voluntary survey conducted in STA 3024 in the Spr.pdf
PDF
1)Today, the overwhelming world leader in microprocessor sales i.pdf
PDF
8. Eenee, Meanie, and Miney each have a capital balance of $84,000 i.pdf
PDF
[Python] [Singly-linked list] [Element insertion] Consider the follo.pdf
PDF
why Cu, Pb, and Sn were metals used in early civilizations Solu.pdf
PDF
Which scenario is the least likely to be supported by the theory of .pdf
PDF
What is the difference between neurotransmitters and neuropeptides .pdf
PDF
5) The US government is spying on Switzerland. They believe Switzerl.pdf
PDF
To qualify for the partial exclusion of gain on the sale or exchange.pdf
PDF
These questions are for Java.1. name of Java class with methods an.pdf
PDF
The United States Central Intelligence Agency, FBI, and National Sec.pdf
PDF
The study of consumer choose one brand over another and how they make.pdf
PDF
Survivin Monomer Plays an Essential Role in Apoptosis Regulation Mar.pdf
PDF
statistics Which is not true of p-values Select one When they are.pdf
Identify and discuss the two basic principles of assessing risk tole.pdf
Help for this question please and have details For the combined ELSI.pdf
Explain the underlying reason that cell membranes have a bilayer str.pdf
Despite the repeated effort by the government to reform how Wall Str.pdf
Could you please fill this out for Postpartum depressionDirection.pdf
A university financial aid office polled an SRS of undergraduate stud.pdf
A confidential and voluntary survey conducted in STA 3024 in the Spr.pdf
1)Today, the overwhelming world leader in microprocessor sales i.pdf
8. Eenee, Meanie, and Miney each have a capital balance of $84,000 i.pdf
[Python] [Singly-linked list] [Element insertion] Consider the follo.pdf
why Cu, Pb, and Sn were metals used in early civilizations Solu.pdf
Which scenario is the least likely to be supported by the theory of .pdf
What is the difference between neurotransmitters and neuropeptides .pdf
5) The US government is spying on Switzerland. They believe Switzerl.pdf
To qualify for the partial exclusion of gain on the sale or exchange.pdf
These questions are for Java.1. name of Java class with methods an.pdf
The United States Central Intelligence Agency, FBI, and National Sec.pdf
The study of consumer choose one brand over another and how they make.pdf
Survivin Monomer Plays an Essential Role in Apoptosis Regulation Mar.pdf
statistics Which is not true of p-values Select one When they are.pdf

Recently uploaded (20)

PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Updated Idioms and Phrasal Verbs in English subject
PDF
01-Introduction-to-Information-Management.pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PPTX
Cell Types and Its function , kingdom of life
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Orientation - ARALprogram of Deped to the Parents.pptx
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
master seminar digital applications in india
Module 4: Burden of Disease Tutorial Slides S2 2025
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Final Presentation General Medicine 03-08-2024.pptx
Updated Idioms and Phrasal Verbs in English subject
01-Introduction-to-Information-Management.pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Cell Structure & Organelles in detailed.
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Paper A Mock Exam 9_ Attempt review.pdf.
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
Cell Types and Its function , kingdom of life
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
A systematic review of self-coping strategies used by university students to ...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Orientation - ARALprogram of Deped to the Parents.pptx
Microbial disease of the cardiovascular and lymphatic systems
Chinmaya Tiranga quiz Grand Finale.pdf
master seminar digital applications in india

1) Name the seven layers of the OSI network model, and 2) enumerate .pdf

  • 1. 1) Name the seven layers of the OSI network model, and 2) enumerate security issues at each level. I have done the first one for you as an example: Layer 1 - Physical: theft, bit errors, denial of service, noise, signal errors, RF interference, removable media, open wall ports, flooding, natural disasters, EMP bomb. Solution The seven layers of the OSI model are as follows: Layer 1-Physical layer: The security issues at this layer are theft, bit errors, denial of service, noise, signal errors, RF interference, removable media, open wall ports, flooding, natural disasters, EMP bomb. Layer 2-Data link layer: The security issues that can occur at this layer are MAC flooding, disruption in the flow of the data. Layer 3-Network layer: The security issues are: ICMP Flooding, load on firewall, loss of confidentiality. Layer 4-Transport Layer: SYN flood, Smurf Attack, Layer 5-Session layer: The security issues that can occur at this layer can occur during the inter- machine communication. Layer 6-Presentation Layer: The poor handling of input (malicious) can lead to crashes. Layer 7-Application Layer: This layer is most prevalent to attack by hackers. At this layer, the entire application can be manipulated, user data can be stolen. It can lead to destruction of the entire network. This is also known as Denial of Service attack.