Network Security Issues in Regard To Osi Reference Model Layers
Network Security Issues in Regard To Osi Reference Model Layers
Keywords:
Network, security, OSI Model, IP protocol, security
Figure 1. OSI and IP models[1]
issues
In data protection and security, steps have to be
1. Introduction
taken to ensure secure means of data
Any network today relies on networking devices
transportation between two or more endpoints.
such as routers and switches. These devices form
a network itself and enable creation of
2. Methods of protection
communication channels between devices and end
IP model's Application layer incorporates functions
users.
of Application, Presentation and Session layers in
In their process of inter-communication, these
OSI model. Therefore, its purpose is to handle
devices use protocols which have the role of
users input and application raw data values, which
language necessary for understanding. Most of the
is the first step of communication.
common protocols used are developed in an open
Protocols domesticated on this layer are HTTP and
manner and adhere to certain standards, which, in
HTTPS, POP, SMTP and IMAP, IRC, FTP and
return, enable devices to communicate regardless
SFTP. Of course, number is quite large and,
of vendor or country of origin.
therefore, not all are listed [2].
Through the development of layered model, with
Data protection of Application layer relies primarily
each layer being interdependent of adherent
on inspection of data in transit using Application
layers, standards establishing the communication
layer firewalls. Such devices filter traffic primarily
framework emerged.
4. Conclusion
While security issues represent a significant threat
to today’s enterprise environments, both from
internal and external subjects, well placed
preemptive security measures can minimize or
almost completely mitigate large portions of risk
involved with the ability to keep data access
allowed purposely for legitimate use.
References
[1] networklessons.com (retrieved 21.07.2014)
[2] Cole E., Krutz R and Conley J, “Network
Figure 4. Topology of VLAN technologies [7] security bible”, Wiley publishing, ISBN 0-
7645-7397-7
3. Viewing the results [3] highteck.net (Retrieved 26.07.2014)
By using suggested methods of protection on [4] Gibson D, “Security+ Guide”, Gibson, ISBN 1-
various layers of the OSI or IP models, a certain 4637-6236-4
level of granularity is achieved in network security [5] tcp-udp.de (Retrieved 28.07.2014)
matter that goes from more general security [6] Barker K., Morris S., “CCNA Security Guide”,
measures to more specific ones. Ciscopress, ISBN 1-5872-0446-0
All this is achieved for the purpose of enhancing [7] cisco.com (Retrieved 09.08.2014)
the security through combination of multiple layers
of security, usually known as “Defense-in-Depth”
which states that: “even if one measure fails,
another one will take its place”.