Securing Protocol Layers   «Prev  Next»

Lesson 3 Physical/data link layers
Objective Physical and data link layers of network.

Physical and Data Link Layers

TCP/IP physical and data link layers

TCP/IP Protocol layers consisting of 1) Application Layer, 2) Transport Layer, 3) Internet Layer, 4) Network Layer

Securing the physical and data link layers

Network layer protocols

The protocols used at the network layers assist in host-to-host communication. Most security threats do not originate at this layer of the TCP/IP stack; however, you must know what protocols are used.

[1]Network topology :The type of network (ethernet or token ring), the IP address range, the subnet mask, and the naming scheme. The most common network topologies are the star, bus, ring and hybrid.

[2]Packet sniffer: A device or program that is used to monitor traffic on a network, can be installed anywhere in a networked system, and is virtually undetectable. Sniffers are used for legitimate network management functions or for stealing information off a network.

[3]Encryption: The process of disguising a message to make it unreadable by humans. The resulting data is called ciphertext.