Security & 7 Layers of the OSI Model
by Brian Gray

Security & 7 Layers of the OSI Model

Many of you have heard of security by layers. Some may relate this to the 7 layers of Cyber Security; 1. The Human Layer 2. The Perimeter Layer 3. The Network Layer 4. The Endpoint Layer 5. The Application Layer 6. The Data Security Layer and 7. Mission Critical Assets or High Value Targets (HVTs).

Although this model is a very applicable especially as it relates to the human layer and our interactions with computers it is my opinion without network or internet connectivity there is no need for security. So understanding how security relates to the OSI model is a key factor in successfully managing risk.

Image to reference: https://media.licdn.com/dms/image/D4E22AQE2v2Nh__bwpQ/feedshare-shrink_1280/0/1699314288679?e=1702512000&v=beta&t=JfvEgieCx8KzMS6yut2mdw0p-qDhS-S51Ex6GbcV6UY





要查看或添加评论,请登录

Brian Gray的更多文章

  • To Process or not to Process

    To Process or not to Process

    There is a fine balance of people, process and technology when it comes to well rounded security programs. Have you…

  • The Human Psyche of Security

    The Human Psyche of Security

    There is a fine balance of people, process and technology when it comes to well rounded security programs. Have you…

  • Supply Chain Risk Management

    Supply Chain Risk Management

    Vendor, Third or Fourth Party & Supply Chain Risk Management are often overlooked as needed processes to determine the…

    1 条评论
  • Free Security Self Assessment Tools

    Free Security Self Assessment Tools

    A self assessment is a good way to baseline your security operations. Here are some free tools available to you to…

    1 条评论
  • Which Security Framework is right for you?

    Which Security Framework is right for you?

    Like just about everything in security not all solutions are equal nor are they right for every organization. The image…

  • Understanding Risk through BIA & Risk Assessment Processes

    Understanding Risk through BIA & Risk Assessment Processes

    Purpose The purpose of this white paper is to outline the difference between a BIA engagement versus a Risk Assessment…

  • Application Testing.

    Application Testing.

    This is a briefing on Automated and Manual Testing methods and how they relate to Pen Testing and Code Review. This…

  • Pentesting 101

    Pentesting 101

    What is Pentesting or Offensive Security (Offsec). Most people have heard of the term Pen Testing.

  • Human Errors & Security Issues

    Human Errors & Security Issues

    I estimate at least 90% of the cyber security issues in the wild are caused by human error. You may wonder how I arrive…

  • Making Sense of Application Security Testing

    Making Sense of Application Security Testing

    This is a briefing on Automated and Manual Testing methods and how they relate to Pen Testing and Code Review. This…

    1 条评论

社区洞察

其他会员也浏览了