The OSI model is the traditional way to transmit data from one computer node to another. The transmission distance can differ from the node being in the next cubicle or to the next continent or anywhere in the world. The data is transmitted and received by the nodes that are connected to the internet. Even offline versions of transmission happen within a closed network of wired or wireless connectivity. Whatever the case may be OSI Model plays the most vital role in the transmission of data. The OSI Model has been passed down from generations of computer systems. This is the foundation of data transmission where the security should be at the maximum. The approach in this paper is to provide an eagle's view on the attacks and security at each layer and the methods to mitigate those threats through penetration testing. Preventing an attack before it happens is the smartest move in the cyber field. Routine checks on the mitigation process will prevent a lot of data theft and save face in the future and protect the data and the network. The structure of this paper involves a short OSI model description and its layers. The attacks can be launched by any malicious hacker in each of the layers which can be mimicked through penetration testing. The mitigation process if any, can be performed for these types of attacks. If a system is armed up with security measures at each layer level, the penetration of that node or network would be next to impossible. This is not an easy feat to achieve and would require a whole lot of creative ideas and foolproof systems in place. Security is one of the top concerns in every area of the personal or professional front. Creating a foolproof system for the transmission of data from layer 1 through to layer 7 of the OSI model implemented among computer nodes can guarantee to be an impossible challenge for hackers to crack at. Over time these security measures can become a guideline or a protocol that would be implemented in the OSI Model. Awareness is the first line of defense or offense that can be initiated for mitigating any kind of attack in the cyber world. Only with knowledge of the attack, an enterprise can protect itself from the outside world. This is the first step towards that long road of awareness and mitigation process of attacks performed on the various layers of the OSI Model.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.