- AWS Certified Advanced Networking:Specialty Exam Guide
- Marko Sluga
- 205字
- 2021-06-24 14:14:52
Security in the OSI model
Network security spans several layers in the OSI model. The following diagram gives us a breakdown of the different attack vectors and the representation of the percentage of attacks that succeeded in compromising an application in 2018:

As we can see, more than half of all attacks are represented by network layer attacks. These are spread out over multiple layers of the OSI model. Network attacks are most commonly layer 3 and layer 4 attacks, and they usually do the following:
- Attack the network service's availability by overloading the network link
- Attack the services on the network that deliver packets to the application such as routers, firewalls, and load balancers
The other half is shared by the other two types of attacks, which are intended to attack the application itself or the services that support the application being available on the internet:
- Application attacks that send malformed or malicious packets on layer 7 directly to the application
- Infrastructure service attacks, which include network attacks against the infrastructure supporting the application
In this section, we will look at all the relevant layers of the OSI model where our services typically reside and look at the approaches to security on these layers.
- 大數(shù)據(jù)戰(zhàn)爭(zhēng):人工智能時(shí)代不能不說的事
- AWS:Security Best Practices on AWS
- MicroPython Projects
- Supervised Machine Learning with Python
- 永磁同步電動(dòng)機(jī)變頻調(diào)速系統(tǒng)及其控制(第2版)
- Cloudera Administration Handbook
- MCGS嵌入版組態(tài)軟件應(yīng)用教程
- Mastering GitLab 12
- 網(wǎng)站規(guī)劃與網(wǎng)頁設(shè)計(jì)
- Microsoft System Center Data Protection Manager Cookbook
- 天才與算法:人腦與AI的數(shù)學(xué)思維
- Flash CS3動(dòng)畫制作
- 巧學(xué)活用Photoshop
- 數(shù)字系統(tǒng)設(shè)計(jì)與Verilog HDL
- Advanced Serverless Architectures with Microsoft Azure