CALL US

+91 8219776763

What is the OSI Model? | Cyberops

What is the OSI Model?

By Prempal Singh 0 Comment April 6, 2017

In an increasingly unfaithful cyber-security landscape – and with corporate networks expanding over desktops and on-site data centers to include cloud connections and remote and mobile staff-organization software presents cyber-criminals and hackers with potential opportunities to steal information and cause damage or stress.

This highlights the advantages of security to expand to both network and the software – whether it’s bought off the shelf or developed in-house. That’s where application coating security and the OSI model come into the picture.

What is the OSI Model?

The Open System Interconnection or OSI Model is a security structure which sets out tips for application security in conditions of seven levels (three media, and four host layers), all of which must be secure for an application to examine safe. Those levels are:

1. The Physical Layer

2. The Data Link Layer

3. The Network layer

4. The Transport Layer

5. The Session Layer

6. The Presentation Layer

7. The Application Layer

1. The Physical Layer:

This is the media layer which provides specialized specifications for physical and electrical data connections. It also the medium by which physical communication occurs between various end points.

Protection in the physical coating is easily threatened by accidental or malicious purpose (e. g. unplugging of power or network cables) or environmental factors like power surges. Denial Of Service (DOS) for essential applications and networks can result. Biometric authentication, electromagnetic shielding, and advanced securing mechanisms are typically used to secure it.

2. The Data Link Layer:

This kind of media layer involves all the data packets which can be moved by the physical layer. Efforts to avoid virtual Local Area Network or VLAN security protocols and the spoofing of network interface identifying mass media access control or MAC  addresses are typical weaknesses of the layer, and successful exploits can go on to compromise the security of the network coating. Filtering MAC addresses and ensuring that all cellular applications have authentication and encryption built in are common security techniques for this layer.

3. The Network Layer:

This final media layer governs the redirecting, control, and addressing of data and traffic on the network.

A major threat to application security in this layer is Internet protocol address or packet spoofing, where data packets originating from harmful sources are disguised so they appear to come from legitimate addresses within the network. Route and anti-spoofing filters together with strongly designed firewalls can best provide security in this coating.

4. The Transport Layer:

This first host coating is may well region in which the copy of information sequences of various lengths occurs. Soft data flows with problem control and measures making sure segmentation and de-segmentation are the marks of a strong transport layer standard protocol such as TCP or Transmission Control Protocol. Reliability is dependent on restricting access to the transmitting protocols and their hidden information, together with strong firewall protection.

5. The Session Layer:

The second of the host levels governs the interaction between local and remote applications. It creates, manages, and terminates connections between machines on demand (i.e., per session).

The session layer is vulnerable to incredible force attacks and might be breached if authentication protocols are weak. To make sure security, authentication should take place through the exchange of encrypted passwords (which must be safely stored), and timers should be put in a destination to limit the number of attempts that may be made to establish a session.

6. The Presentation Layer:

This kind of logical or host coating uses a number of conversion methods to standardize data from various local formats, as information is transferred from the application layer to the network.

Input from users (which should have been washed up before it moves on to functions) should be segregated from program control functions, to avoid malicious inputs that might lead to system failures or exploits.

7. The Application Layer:

The last host layer is the one closest to the end user – and one which presents potential criminals with the biggest strike surface. The application layer includes the user interface and various other critical functions, and if successfully used entire networks may be turn off in a Denial of Service attack, consumer data may be thieved, and individual applications may come under an intruder’s control.

Secure application development techniques will be the safest way to guarantee that applications are able to sanitize consumer input, discover malicious activity, and securely handle and transfer sensitive information.

OSI on the Network:

The OSI methodology has recently been extended beyond advice for separate applications to layer-based security standards for sites, namely the OSI reference model for networking (ISO 7498-1) and the OSI security architecture reference model (ISO 7498-2).

For network applications, each layer may communicate only with the layer above or below it. And each coating is developed independently of the others, that enables for overall flexibility and zero gaps caused by the activities of other Layers.

Every single communication is required to get started on at the top of the sequence and work its way throughout the pile of layers as it can transmit from its source. At the obtaining end, the recipient starts at the bottom layer and works its back up the stack until it reaches the level appropriate for its specific use case.

Relevant information is attached to each communication as it passes by using a layer (a process called encapsulation). These types of encapsulation tags allow each layer to communicate with its corresponding layer at the destination.

I. Layer Model-ISO 7498:

The OSI convention of seven layers applies to the OSI reference model for networking, as follows:

1. Application Layer
2. Presentation Layer
3. Session Layer
4. Transport Layer
5. Network Layer
6. Data Link Layer
7. Physical Layer

II. Layer Model-ISO 7498:

The seven OSI layers of the OSI security architecture reference model include:

1. The Authentication Layer

2. The Access Control Layer

3. The Non-Repudiation Layer

4. The Data Integrity Layer

5. The Confidentiality Layer

6. The Assurance / Availability Layer

7. Notarization / Signature Layer

Practical Applications of the OSI Model:

Application coating security comes into play for almost all of the web-based activities we now take for granted. And OSI modeled application layer protocols are at work in common use cases including the HyperText Transfer protocol (HTTP) utilized in web browsers and browser-based client software.

Other applications are the Simple Message Transport Protocol (SMTP) used in transmitting email alerts and video accessories and the Simple Network Management Protocol (SNMP) used in monitoring network devices and reporting on their condition.

I hope this article is helpful for you all, please subscribe us for more latest updates.

error: Content is protected by Cyberops !!