OSI Model Security
Security Attacks, Mechanisms, and Services
Layer-by-Layer Security Analysis
Security Attack Classification
Two Main Categories:
- Passive Attacks: Monitor and eavesdrop
- Active Attacks: Modify or disrupt data
Layer 1: Physical Layer
Security Attacks:
- Eavesdropping on physical media
- Physical damage to hardware
- Cable tapping
Security Mechanisms:
- Shielded cables
- Physical security controls
- Surveillance systems
Layer 2: Data Link Layer
Security Attacks:
- MAC spoofing
- Switching attacks
- MAC flooding
Security Mechanisms:
- MAC address filtering
- Port security
- Link encryption
Layer 3: Network Layer
Security Attacks:
- IP spoofing
- Routing attacks
- DDoS attacks
Security Mechanisms:
- Firewalls
- Intrusion Detection Systems
- IPsec
Layer 4: Transport Layer
Security Attacks:
- Port scanning
- Session hijacking
- TCP flooding
Security Mechanisms:
- Transport Layer Security (TLS)
- TCP wrappers
- Port filtering
Layer 5: Session Layer
Security Attacks:
- Session hijacking
- Session fixation
- Session replay
Security Mechanisms:
- Session tokens
- Session timeouts
- Secure session management
Layer 6: Presentation Layer
Security Attacks:
- Man-in-the-Middle (MitM)
- Data interception
- Encryption attacks
Security Mechanisms:
- Encryption/Decryption
- Data compression
- Digital certificates
Layer 7: Application Layer
Security Attacks:
- Malware
- Phishing
- SQL injection
- Cross-site scripting (XSS)
Security Mechanisms:
- Antivirus software
- Web Application Firewalls
- Authentication systems
Security Services by Layer
- Physical: Physical protection
- Data Link: Link encryption
- Network: Secure routing
- Transport: End-to-end encryption
- Session: Session management
- Presentation: Data encryption
- Application: Authentication & authorization
OSI Layers Memory Aid
"Please Do Not Throw Sausage Pizza Away"
- Physical
- Data Link
- Network
- Transport
- Session
- Presentation
- Application
Layered Security Strategy
- Defense in Depth: Security at multiple layers
- Layer Coordination: Integrated security approach
- Complementary Controls: Different mechanisms per layer
- Comprehensive Coverage: Address all attack vectors
Real-World Examples
- HTTPS: Multiple layer security (3,4,6,7)
- VPN: Network and transport layer protection
- WiFi Security: Physical and data link protection
- Email Security: Application layer protection
OSI Security Best Practices
- Implement security at multiple layers
- Match security mechanisms to threats
- Regular security assessments per layer
- Monitor all layer activities
- Keep security mechanisms updated
Key Takeaways
- Each OSI layer has specific security concerns
- Different attack types require different defenses
- Layered security provides comprehensive protection
- Understanding layers helps in threat modeling
- Security mechanisms must work together
Remember: Layer-by-layer security = Defense in depth
Thank You
Questions & Discussion
Next: Cryptography Basics and Fundamentals

