Talk With an Expert

Understanding Security Using the OSI Model

Understanding Security Using the OSI Model (PDF, 1.84MB)Published: 20 Mar, 2002
Created by
Glenn Surman

This paper is written as a guide for those who do not labor through the wee hours of the morning (yet) studying every new Information Technology (IT) vulnerability. This paper will provide a breakdown of the OSI (Open Source Interconnection) model, and using that model, explain some well-known vulnerabilities. The paper will take each layer of the OSI model (there are seven) and describe a relevant vulnerability with a solution to that problem area. The reader will become more aware of the vulnerabilities that exist in the IT environment. More importantly, the reader will be able to use the OSI model as a guide to simplify the security process.

Understanding Security Using the OSI Model