Solved

OSI Model Security Types

Posted on 2004-08-11
3
1,607 Views
Last Modified: 2007-12-19
What is the Security Types of the OSI model
0
Comment
Question by:kwlowe55
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 12

Accepted Solution

by:
Gary Dewrell earned 125 total points
ID: 11779871
kwlowe55 I'm not sure I understand your question.
The OSI model provides a universal set of rules that make it possible for various manufacturers and developers to create software and hardware that is compatible with each other.

There is an  OSI Security Model:
OSI Security Model 7498-2  
Authentication
Access Control
Non-Repudiation
Data Integrity
Confidentiality
Assurance / Availability
Notarization / Signature
 
See these sites for more info.


http://www.rpatrick.com/tech/sevenlayers/
http://www.comtest.com/tutorials/osi.html
0

Featured Post

Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ready for our next Course of the Month? Here's what's on tap for June.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

689 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question