Solved

OSI Model Security Types

Posted on 2004-08-11
3
1,604 Views
Last Modified: 2007-12-19
What is the Security Types of the OSI model
0
Comment
Question by:kwlowe55
3 Comments
 
LVL 12

Accepted Solution

by:
Gary Dewrell earned 125 total points
ID: 11779871
kwlowe55 I'm not sure I understand your question.
The OSI model provides a universal set of rules that make it possible for various manufacturers and developers to create software and hardware that is compatible with each other.

There is an  OSI Security Model:
OSI Security Model 7498-2  
Authentication
Access Control
Non-Repudiation
Data Integrity
Confidentiality
Assurance / Availability
Notarization / Signature
 
See these sites for more info.


http://www.rpatrick.com/tech/sevenlayers/
http://www.comtest.com/tutorials/osi.html
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
The related questions "How do I recover the passwords for my Q-See DVR" and "How can I reset my Q-See DVR to eliminate a password" are seen several times a week.  Here we discuss the grim reality of the situation.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question