Pick one layer and describe typical attacks in that layer and the controls that are employed in
Fantastic news! We've Found the answer you've been seeking!
Question:
Pick one layer and describe typical attacks in that layer and the controls that are employed in the layer to minimize the attack or vulnerability that leads to the attack.
Layer 1: Physical; Layer 2: Link; Layer 3: Network; Layer 4: Transport, and Layer 5: Application.
(This is IP Layering; in IP layering, roughly Session, Presentation and Application of the OSI layers are combined into a single Application layer).
Related Book For
Management People Performance Change
ISBN: 978-0132176408
1st edition
Authors: Luis R. Gomez Mejia, David B. Balkin
Posted Date: