1. Encryption can take place at several different layers of the protocol stack.
ID: 3903803 • Letter: 1
Question
1. Encryption can take place at several different layers of the protocol stack. Does encryption make sense at level 1 (the Physical Layer)? Why, or why not?
2. What are some of the significant differences between encryption at level 2 (the Data Link Layer) and at level 3 (the Network Layer). Think about what each layer does, and hence when, as a message passes through the network, encryption and decryption need to take place depending on whether the encryption takes place at level 2 or level 3. Discuss the benefits and risks of each.
3. Be creative, but realistic: Describe an example (of your own creation) of a business. Be brief, but clear. If you have a part-time job or a family business you could describe that business. If you don't have any direct experience of a business from the inside, that's ok -- you're interacting with businesses all the time, so you can choose a business that you are a customer of and describe it. Now develop a sample risk control spreadsheet for assets and threats that you can identify or imagine in your described business. The spreadsheet doesn't have to be complete, but it should be representative or a wide range of concerns.
You should be able to do all this in one to two pages. Do not submit more than two pages.
Explanation / Answer
ANSWER:
1) Encryption can take place at several different layers of the protocol stack. Does encryption make sense at level 1 (the Physical Layer):
2) Difference between encryption at level 2 and at level 3:
PHYSICAL LAYER
1. Physical characterstics of interfaces and medium
2. Representation of bits
3.Synchronization of bits
4. Line Configuration
DATA LINK LAYER
1. Framing
2. Physical Addressing
3. Flow and Error Control
NETWORK LAYER
1. Logical Addressing
2. Routing
TRANSPORT LAYER
1. Service Point addressing
2 Segmentation and reassembly
3. Connection Control
SESSION LAYER
1. Dialog Control
2. Synchronization
PRESENTATION LAYER
1. Translation
2. Encryption
3. Compression
APPLICATION LAYER
1. Network virtual terminal
2. File transfer, access and management
3. Mail Service
4. Directory Service
Risk of each
OSI model Layer 1 attacks
OSI model Layer 2 attacks
OSI model Layer 3 attacks
OSI model Layer 4 attacks
OSI model layer 5-7
Benifit of each layer:
Dividing the network into the seven layers provides following advantage:
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.