Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. Encryption can take place at several different layers of the protocol stack.

ID: 3903803 • Letter: 1

Question

1. Encryption can take place at several different layers of the protocol stack. Does encryption make sense at level 1 (the Physical Layer)? Why, or why not?

2. What are some of the significant differences between encryption at level 2 (the Data Link Layer) and at level 3 (the Network Layer). Think about what each layer does, and hence when, as a message passes through the network, encryption and decryption need to take place depending on whether the encryption takes place at level 2 or level 3. Discuss the benefits and risks of each.

3. Be creative, but realistic: Describe an example (of your own creation) of a business. Be brief, but clear. If you have a part-time job or a family business you could describe that business. If you don't have any direct experience of a business from the inside, that's ok -- you're interacting with businesses all the time, so you can choose a business that you are a customer of and describe it. Now develop a sample risk control spreadsheet for assets and threats that you can identify or imagine in your described business. The spreadsheet doesn't have to be complete, but it should be representative or a wide range of concerns.


You should be able to do all this in one to two pages. Do not submit more than two pages.

Explanation / Answer

ANSWER:

1) Encryption can take place at several different layers of the protocol stack. Does encryption make sense     at level 1 (the Physical Layer):

2) Difference between encryption at level 2 and at level 3:

PHYSICAL LAYER

1. Physical characterstics of interfaces and medium

2. Representation of bits

3.Synchronization of bits

4. Line Configuration

DATA LINK LAYER

1. Framing

2. Physical Addressing

3. Flow and Error Control

NETWORK LAYER

1. Logical Addressing

2. Routing

TRANSPORT LAYER

1. Service Point addressing

2 Segmentation and reassembly

3. Connection Control

SESSION LAYER

1. Dialog Control

2. Synchronization

PRESENTATION LAYER

1. Translation

2. Encryption

3. Compression

APPLICATION LAYER

1. Network virtual terminal

2. File transfer, access and management

3. Mail Service

4. Directory Service

Risk of each

OSI model Layer 1 attacks

OSI model Layer 2 attacks

OSI model Layer 3 attacks

OSI model Layer 4 attacks

OSI model layer 5-7

Benifit of each layer:

Dividing the network into the seven layers provides following advantage: