Pregled bibliografske jedinice broj: 1013695
Network Security Issues in Regard to OSI Reference Model Layers
Network Security Issues in Regard to OSI Reference Model Layers // Proceedings of TEAM 2014: 6th International Scientific and Expert Conference of the International TEAM Societ / Major, Andrea Ádámné (ur.).
Kecskemét: Kecskemét College, Faculty of Mechanical Engineering and Automation, 2014. str. 105-107 (pozvano predavanje, međunarodna recenzija, cjeloviti rad (in extenso), ostalo)
CROSBI ID: 1013695 Za ispravke kontaktirajte CROSBI podršku putem web obrasca
Naslov
Network Security Issues in Regard to OSI Reference Model Layers
Autori
Martinović, Marko ; Lovaković, Dino ; Ćosić, Tomislav
Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), ostalo
Izvornik
Proceedings of TEAM 2014: 6th International Scientific and Expert Conference of the International TEAM Societ
/ Major, Andrea Ádámné - Kecskemét : Kecskemét College, Faculty of Mechanical Engineering and Automation, 2014, 105-107
ISBN
978-615-5192-22-7
Skup
6th International Scientific and Expert Conference of the International TEAM Society
Mjesto i datum
Kecskemét, Mađarska, 10.11.2014. - 11.11.2014
Vrsta sudjelovanja
Pozvano predavanje
Vrsta recenzije
Međunarodna recenzija
Ključne riječi
Network security ; OSI Model ; IP protocol ; security issues
Sažetak
Today, almost all aspects of what we regard as data-in-storage and data-on-move is connected. Entire organizational infrastructure is networked and capable of inter-communication. Such capabilities offer easy reach and focus on data, which is considered a primary value to any organization or institution that possesses it. However, with the need for high data and communications availability also comes a potential risk. Various threats can compromise and breach data integrity and confidentiality by finding a way into or “taping” regular network channels. Computer networks based on TCP/IP stack use various layers of communication and underlying protocols respectively. Such design can provide independent fault tolerance and ensures compatibility of equipment made from different vendors as they all adhere to open standards. Here, we will address the issues of most common security threats on Layers 2, 3 and 4 of the OSI model, and their DoD model counterparts, as they are, by far, the most targeted by todays potential threats. Mitigation techniques and security policies will also be mentioned as they are vital part of both data confidentiality and integrity
Izvorni jezik
Engleski
Znanstvena područja
Računarstvo