Discuss about the osi layers

Assignment Help Computer Networking
Reference no: EM131295429

Pick one layer and describe typical attacks in that layer and the controls that are employed in the layer to minimize the attack or vulnerability that leads to the attack. For example, in the link and network layers, there can be packet sniffing attacks, in the IP (network layer), there could be spoofing attacks, and in various layers, there could be denial of service attacks. 300 words min, be as specific and as complete as possible and cite your reference materials in your response.

Focus on typical attacks in the Internet affecting confidentiality, integrity and availability at various layers:

Layer 1: Physical;

Layer 2: Link;

Layer 3: Network;

Layer 4: Transport, and

Layer 5: Application.

(This is IP Layering; in IP layering, roughly Session, Presentation and Application of the OSI layers are combined into a single Application layer).

Reference no: EM131295429

Questions Cloud

Leadership strategy for a specific project : Develop an action equation for your organization (or the last organization for which you worked). The action equation should address overall leadership strategy or leadership strategy for a specific project or goal.
What equivalent leakage resistance parallel with capacitor : Suppose that after 24 h the voltage across a 100-F super capacitor is 4:75 V. What is the equivalent leakage resistance in parallel with the capacitor?
Summarize the major mathematical concepts of this course : Summarize the major mathematical concepts of this course. Explain how the concepts learned in this course are relevant to the characteristics of a professional mathematics teacher.
Average-cost method-amount allocated to ending inventory : A company just began business and made the following four inventory purchases in June: A physical count of merchandise inventory on June 30 reveals that there are 200 units on hand. Using the average-cost method, the amount allocated to the ending in..
Discuss about the osi layers : discuss about the OSI layers in detail.and describe typical attacks in that layer and the controls that are employed in the layer to minimize the attack or vulnerability that leads to the attack.
You will reflect on how you analyzed the movie : You will reflect on how you analyzed the movie as well as how your ability to analyze film in general has evolved -  Analysis For this stage, you will be analyzing a movie selected from the AFI's 10 Top 10 list. The film you choose can be one that y..
Discussion centers on strategy implementation : This week's discussion centers on strategy implementation. Using a case study in Chapter 9, answer one of the following questions about how organizational structure impacts the way business gets done:
Temporary differences were associated with future taxable : The information that follows pertains to Ester Foods Products: At December 31, 2013, temporary differences were associated with the following future taxable (deductible) amounts: Complete the following table given below and prepare the appropriate jo..
Is circuit overdamped or critically damped or underdamped : Find vC (t) and iL(t) for t ≥ 0.-  Is the circuit overdamped, critically damped, or underdamped?- Use Multisim to validate your results.

Reviews

Write a Review

Computer Networking Questions & Answers

  How company can manage snmp from corporate location

Write one-page proposal of how company can manage SNMP from corporate location. Include details on versions, basic operations, and MIBs. Describe the benefits of this kind of centralized monitoring.

  Explain all potential security threats on personal computer

Computer security is not the issue for organizations alone. Anyone whose personal computer is connected to the network or Internet faces the potential risk of attack.

  Create an in-house private social network and then use it

1 are companies that introduce a significant change in their industries thus causing a disruption in normal business

  What are some common risks found in the lan-to-wan domain

What are some common risks, threats, and vulnerabilities found in the LAN-to-WAN domain that must be mitigated through a layered security strategy

  Biometric authentication methods for online transactions

Biometric authentication methods for online transactions, The physical attributes inherent in biometric authentication methods raise interesting problems

  What is the role of dns and how is it structured

What is the role of DNS, how is it structured, and why it is necessary? What are the different kinds of DNS servers and their purpose across a WAN or the Internet

  What is the type of block of the abbreviated ipv6 address

list the networking and communication devices required, including the IP addresses, product numbers, the cost of each and the approximate total cost.

  Computation of a routing table using dijkstras spf algorithm

calculate its routing table, thereby enabling forwarding of network traffic between end systems. The purpose of the project is to design and implement a simple Link-State Routing Protocol

  Discuss current advancements in wireless technologies

Discuss current advancements in wireless technologies in these industries. Analyze the potential areas for advancements in wireless technologies for these industries and determine the driving forces behind those advancements.

  Protocol data units

Each layer of the Open Systems Interconnection (OSI) model has one or more protocol data units (PDUs) associated with it; in the case of Layer 2, at which switching is executed, the PDU used is the frame. Do some research on the various frame type..

  Discuss the performance metrics of a computer networ

Discuss the performance metrics of a computer networ

  Categorical feature comparison for the products

Prepare a report providing categorical feature comparison for the three products in the chosen category and make recommendations about the products to assist purchasing decision.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd