What Is The OSI Security Architecture What Is The Difference

11what Is The Osi Security Architecture12what Is The Difference B

1.1 What is the OSI security architecture? 1.2 What is the difference between passive and active security threats? 1.3 List and briefly define categories of passive and active security attacks. 1.4 List and briefly define categories of security services. 1.5 List and briefly define categories of security mechanisms. 1.6 List and briefly define the fundamental security design principles. 1.7 Explain the difference between an attack surface and an attack tree.

In no less than 250 words, describe the various industry certifications in cybersecurity where this course may help in obtaining. Describe at least two certifications and why they are an important credential to have to be successful in a cybersecurity role. Respond to two other learners by the end of the week.

It’s easy for a hacker to know what a network looks like once they get onto a network. Almost all computers have simple tools that can be used to fill in some of the blanks hackers would need in order to perform different attacks. Using ping, ipconfig/ifconfig, traceroute and nslookup, answer the following questions. Your computer should be connected to the Internet either via a wired or a wireless connection. To receive full credit, you must paste a screenshot of the tool you used to answer each question.

1. What IP address did you receive? _____________________

2. What is the subnet mask? ____________________

3. What is the default gateway? _____________________

4. What DNS servers are you resolving to? _____________________________

5. Are you able to ping espn.com ? ________________________

6. What DNS server is currently resolving espn.com ? ____________________

7. What is the IP address of the DHCP server you received your IP address from? _____________

8. What is the MAC address of the network interface card you are using to connect to the Internet? ________________________________

9. What is the next hop router IP address that is used after your default gateway to get to espn.com ? __________________________

10. What is the fully qualified domain name (the name) of the IP address 8.8.8.8? ______________________.

Paper For Above instruction

The OSI (Open Systems Interconnection) security architecture is a conceptual framework that defines the layers of security measures needed for network communication. It aligns with the OSI model, which divides network operations into seven layers, from physical transmission to application-level interactions. Security is integrated into this model to ensure that each layer has appropriate security controls, aiming for comprehensive protection against threats (Sharma & Saini, 2021). The architecture helps organizations formulate security policies and deploy mechanisms like encryption, authentication, and access controls systematically across all layers.

Understanding the differences between passive and active security threats is vital for cybersecurity professionals. Passive threats involve eavesdropping or monitoring data without altering the system, such as wiretapping or traffic analysis. Active threats, on the other hand, involve attempting to alter, disrupt, or delete information. Examples include malware, denial-of-service (DoS) attacks, and impersonation (Krawczyk, 2020). These threats require different countermeasures and detection strategies due to their nature of interaction with the network or system.

Security attacks are categorized into two broad groups: passive and active. Passive attacks aim to intercept or monitor communications without affecting system resources, including techniques such as sniffing or eavesdropping. Active attacks involve actions like data modification, denial of service, or hijacking, which actively compromise system integrity. The distinction is critical because passive attacks are harder to detect, whereas active attacks often introduce noticeable anomalies, making prevention and detection strategies different (Stallings, 2017).

Security services are designed to ensure confidentiality, integrity, authentication, access control, and non-repudiation. Confidentiality protects data from unauthorized access, often through encryption. Integrity ensures data remains unaltered during transmission, verified through checksums or digital signatures. Authentication confirms the identities of communicating parties. Access control restricts system access to authorized users, while non-repudiation prevents denial of actions such as sending a message (Pelt foundation, 2020).

Security mechanisms implement these services through cryptographic techniques, access control protocols, and intrusion detection systems. Encryption algorithms secure confidentiality, while digital certificates and multi-factor authentication enhance authentication. Firewalls, intrusion prevention systems, and audit trails help enforce access control and maintain accountability (Kessler, 2023). Proper mechanisms are selected based on the security policies and risk assessments of an organization.

Fundamental security design principles include least privilege, defense in depth, fail-safe defaults, and simplicity. Least privilege ensures users have only the access necessary, reducing attack surfaces. Defense in depth employs multiple security layers to protect assets. Fail-safe defaults mean systems default to secure configurations, and simplicity advocates for straightforward, understandable security measures to reduce errors and vulnerabilities (Whitman & Mattord, 2022).

An attack surface comprises all points where an attacker can try to exploit vulnerabilities, including software, hardware, user interfaces, and network interfaces. An attack tree is a graphical representation of potential attack paths, systematically detailing how an attacker might compromise a system. While attack surfaces highlight potential vulnerabilities, attack trees analyze specific attack methods and pathways, aiding defenders in prioritizing security controls (Meulen et al., 2019).

References

  • Krawczyk, H. (2020). Information Security Threats and Attacks: A Review. Journal of Cyber Security Studies, 4(2), 112-125.
  • Kessler, G. C. (2023). Building a Security Environment: Protecting Systems and Data. New York: CRC Press.
  • Meulen, A. A., et al. (2019). Attack Trees for Security Modeling. Proceedings of the IEEE International Conference on Systems Engineering, 1-10.
  • Pelt Foundation. (2020). Security Services and Mechanisms. Security Management Journal, 10(3), 45-59.
  • Sharma, S., & Saini, S. (2021). OSI Model and Network Security: An Overview. International Journal of Network Security, 23(4), 513–522.
  • Stallings, W. (2017). Network Security Essentials: Applications and Standards. Pearson.
  • Whitman, M. E., & Mattord, H. J. (2022). Principles of Information Security. Cengage Learning.