• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

Safeguarding Confidentiality: The OSI Model’s Role in Data Security

Evan Morris / 5 min read.
July 19, 2023
Datafloq AI Score
×

Datafloq AI Score: 82.67

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/HBcJu

The Open Systems Interconnection (OSI) model is a framework created to serve as a guide on how the different network layers come together to make network communications possible. It is not exactly an exciting concept in IT and there is hardly any news or recent feature story about it. However, this conceptual framework is crucial to modern information technology as it enables a wide range of communication systems to work interoperably under standard protocols for online communications.

One of the most important roles of the OSI framework is data privacy and security. It does not only enable communication; it does this with the utmost regard for confidentiality. Nowadays, given the aggressiveness of cyber attacks, this is not optional but imperative.

OSI model: is it still relevant?

Before discussing OSI’s role in ensuring data confidentiality, here’s an important question to address: is it still relevant? With the emergence of various security protocols, standards, and solutions, it makes sense to address the questions on the framework’s applicability in modern computing.

The short answer is yes, OSI continues to be relevant. However, the reality is that the TCP/IP model is more popular in today’s computing systems, as it provides more practical benefits. Nevertheless, the OSI model has its benefits, particularly it comes to troubleshooting, flexibility, and as a tool for teaching network communications.

The OSI model allows IT teams to more easily classify their IT assets at different layers. As such, it makes it easy to find, understand, and resolve problems because of the clear distinction in different layers. It is different from TCP/IP, which has the top three layers (more on this below) integrated into a single layer.

When it comes to flexibility, OSI provides the advantage of supporting connection-oriented and connectionless services. It is also designed to provide layer independence, protocol interoperability, and end-to-end communication regardless of the service type employed.

Moreover, the OSI model is useful in educating those who are new to networking and software-hardware dynamics. Because of its relatively simple nature and flexibility, this model provides an easy way to understand networking concepts. It does not have the ambiguity and complexity of other models, especially in terms of layers and security implications.

Seven layers

The OSI model consists of seven layers. These are the physical, data link, network, transport, session, presentation, and application layers. Every layer serves a critical role in the networking stack, operating with the layers next to them through the exchange of protocol data units.

The first layer, the physical layer, is the point where the physical transmission of the raw bitstream takes place. In this layer, the transmitted bits are converted to electric, radio, or light signals.

The second layer is called the data link layer. It is responsible for digesting data into frames to be moved to the physical layer. It is also in this layer where connections between nodes are managed. Here, data connections are set up and identified. If there are bit errors (that come from the physical layer) encountered, they are resolved in this layer. Also, once a data connection session is completed, it is terminated in the data link layer.

From the data link layer, where connections are on a point-to-point basis, the connections expand into many interconnected nodes at the network layer. This is the third layer, where traffic is routed to their intended destinations based on IP addresses. The network layer also enables the implementation of VPNs.


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

As mentioned earlier, the three layers above are the top three layers that are separate in the OSI model but are fused as a single layer in the TCP/IP model. As described, their roles are quite distinct from each other, so there is an advantage in having them as separate leaders. It simplifies processes and makes it easy to understand the system and troubleshoot.

The fourth layer is the foremost component of the so-called “host” layers (the four other layers besides the first three). It is called the transport layer, where data transmission between nodes is managed. It is in this layer where the data arrival sequence is ascertained and errors are resolved. This is the layer where the Transmission Control Protocol works.

The fifth is the session layer. As the name suggests, this is the layer where sessions between nodes are managed. Management here usually entails setup, authentication, termination, and reconnection processes.

Sixth on the list is the presentation layer. This is where data from network data is translated into formats that are compatible with the specific applications requesting the data. It is also in this layer where data encoding and encryption are handled.

Lastly, the seventh layer is called the application layer. It is the layer facing end users, where data transmission between a web server and a client takes place. The HTTP protocol, for example, operates in this layer.

How does the OSI model keep data secure?

The OSI data model is not a data security solution or protocol. However, it plays a role in data security because of the way it is designed. Its structured approach in enabling network communications and more granular layers supports the implementation of more security mechanisms.

The OSI model makes it possible to add security controls at the physical, data link, and network layers, unlike in the TCP/IP model where these three layers are joined together as a single layer. At the physical layer, organizations can add restrictions for equipment access or video surveillance to make unauthorized access and network tampering difficult or at least extremely cumbersome.

With the data layer, organizations can impose MAC address filtering to make sure that unauthorized access attempts are prevented. They can also implement link-level encryption to counter eavesdropping or data transmission interception tactics.

In terms of network layer security, organizations can put up firewalls, VPNs, or network traffic control systems. These solutions make it possible to specify policies and restrictions over data transmissions, especially the data being routed to various destinations. It makes it possible to create secure tunnels over public networks (through VPNs).

Separate security mechanisms can then be added to the other layers, namely the transport, session, presentation, and application layers. Organizations can create more robust security measures or cyber defenses with the OSI model because it has more layers for network communications and it is compatible with complex and multifaceted cyber defenses including user access controls, security audits, and intrusion detection systems.

Enabling security and confidentiality

Having more layers may be an advantage for the OSI model, but it can also be a drawback because it means more attack surfaces or opportunities for threat actors to find vulnerabilities. Cybercriminals, for example, can find weaknesses at the data link layer to siphon data or intercept the transmission of sensitive information. Nevertheless, with the right knowledge and understanding of the model, it should not be difficult to implement suitable solutions to ensure security and the confidential handling of data across different layers. With its layered structure and well-defined functions, the OSI model affords a comprehensive framework for implementing data security measures.

Categories: Cybersecurity
Tags: Data, Data security, security
Credit: https://avertec.co.uk/wp-content/uploads/2021/11/cyber-security-feature-image-optimised.jpg

About Evan Morris

Known for his boundless energy and enthusiasm. Evan works as a Freelance Networking Analyst, an avid blog writer, particularly around technology, cybersecurity and forthcoming threats which can compromise sensitive data. With a vast experience of ethical hacking, Evan's been able to express his views articulately

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post
Host your website with Managed WordPress for $1.00/mo with GoDaddy!

Related Articles

The Advantages of IT Staff Augmentation Over Traditional Hiring

May 4, 2023 By Mukesh Ram

The State of Digital Asset Management in 2023

May 3, 2023 By pimcoremkt

Test Data Management – Implementation Challenges and Tools Available

May 1, 2023 By yash.mehta262

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics app Apple application Artificial Intelligence BI Big Data business China Cloud Companies company costs court crypto customers Data digital environment future Google+ government industry information learning machine learning market mobile Musk news Other public research revenue sales security share social social media strategy technology twitter

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Oracle Cloud Data Management Foundations Workshop
  • Data Science at Scale
  • Statistics with Python
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • 5 Reasons Why Modern Data Integration Gives You a Competitive Advantage
  • 5 Most Common Database Structures for Small Businesses
  • 6 Ways to Reduce IT Costs Through Observability
  • How is Big Data Analytics Used in Business? These 5 Use Cases Share Valuable Insights
  • How Realistic Are Self-Driving Cars?

Search

Tags

AI Amazon analysis analytics app Apple application Artificial Intelligence BI Big Data business China Cloud Companies company costs court crypto customers Data digital environment future Google+ government industry information learning machine learning market mobile Musk news Other public research revenue sales security share social social media strategy technology twitter

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!