The open systems interconnection (OSI) model is inefficient; each layer must take the work of higher layers, add some result, and pass the work to lower layers. This process ends with the equivalent of a gift inside seven nested boxes, each one wrapped and sealed. Surely this wrapping (and unwrapping) is inefficient. From reading earlier chapters of this book, cite a security advantage of the layered approach.

Fill in the blank(s) with the appropriate word(s).


Modularity and encapsulation, least privilege, least common mechanism.
Obviously, the physical layer has to be at the bottom of the OSI stack, with applications at the top. Justify the order of the other five layers as moving from low to high abstraction.


Computer Science & Information Technology

You might also like to view...

Python uses ‘if' and ‘else' as the keywords for a selection control structure.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The storage capacity of a single-layer ________ is 25 GB

A) flash drive B) Blu-ray disc C) DVD D) CD

Computer Science & Information Technology

It is easier to assign dollar values to intangible than to tangible benefits.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Layer 2 switches forward packets based on IP addresses.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology