[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

OSI Model Security Types

Posted on 2004-08-11
3
Medium Priority
?
1,612 Views
Last Modified: 2007-12-19
What is the Security Types of the OSI model
0
Comment
Question by:kwlowe55
1 Comment
 
LVL 12

Accepted Solution

by:
Gary Dewrell earned 500 total points
ID: 11779871
kwlowe55 I'm not sure I understand your question.
The OSI model provides a universal set of rules that make it possible for various manufacturers and developers to create software and hardware that is compatible with each other.

There is an  OSI Security Model:
OSI Security Model 7498-2  
Authentication
Access Control
Non-Repudiation
Data Integrity
Confidentiality
Assurance / Availability
Notarization / Signature
 
See these sites for more info.


http://www.rpatrick.com/tech/sevenlayers/
http://www.comtest.com/tutorials/osi.html
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Considering today’s continual security threats, which affect Information technology networks and systems worldwide, it is very important to practice basic security awareness. A normal system user can secure himself or herself by following these simp…
Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question