Describe how encryption is implemented at various layers of the OSI model.

What will be an ideal response?


The process of encryption varies dramatically depending on what you want to encrypt. Encryption can happen at different layers of the OSI model as follows:
•         Layer 1 No common encryption is done at this layer, until you get to some of the bigger WAN technologies, like SONET.
•         Layer 2 No common encryption is done at this layer.
•         Layer 3 Only one common protocol encrypts at Layer 3: IPsec. IPsec is typically implemented via software that encrypts the IP packet. A new outer packet completely encapsulates and encrypts the inner packet.
•         Layer 4 Neither TCP nor UDP offers any encryption methods, so nothing happens security-wise at Layer 4.
•         Layers 5, 6, and 7 Important encryption standards (such as SSL and TLS used in e-commerce) happen within these layers, but don't fit cleanly into the OSI model.
 
 

Computer Science & Information Technology

You might also like to view...

calculate y component double Vect :: ycomponent( Vect ) const

What will be an ideal response?

Computer Science & Information Technology

Data stored in Plain Text contains:

A) no capital letters; all text is converted to lower case. B) no formatting, such as bold or italics. C) all capital letters; all text is converted to upper case. D) no punctuation, such as commas or periods.

Computer Science & Information Technology

In a table, pressing Enter moves the insertion point to the next cell in the same row

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is NOT controlled by choosing a chart style?

A) Sparklines B) Data series C) Color of the chart area D) Plot area

Computer Science & Information Technology