Security Trends

kali CIA OSI foundation

Security Trends

  • Security Trends introduces the foundations of computer security, highlighting evolving threats, attack methods, and the importance of proactive defense strategies. It emphasizes how cybercrime, advanced persistent threats, and ethical considerations shape modern security practices.
  • What exactly is Computer Securty: -> protecting information systems from unauthorized access, miuse, or damage.
  • Computer Security depends on the following: -> Confidentiality - is my data protected? -> Integrity - is my data not altered? -> Availability - can i access my data anytime?
  • Confidentiality checks whether the data has been compromised or not.
  • Integrity ensures authorized modifications.
  • Availability ensures that authorized access to data and resources is always available.
  • Confidentiality and Integrity have a direct relationship

The OSI Security Architecture

  • Open Systems Interconnection (OSI) is very much necessary because hacking is about interconnected networks.
  • The OSI model has seven (7) layers; each layer is generally called an N layer.
    • Application Layer: Interfaces directly with user applications
    • Presentation Layer: Formats, Encrypt, and Compresses data.
    • Session Layer: Manages communcation between devices.
    • Transport Layer: Handles end-to-end communication, flow control, and error connection.
    • Network Layer: Manages logical addressing and routing of packets across different networks.
    • Data-Link Layer: Facilitates node-to-node data transfer on the same network using frames and MAC Addresses.
    • Physical Layer: Transmits raw data bits over chabkes, switches or even wireless media.