The worm will then be able to infect the devices within the new network.

Published by

Nov 9, 2022


Struggling with a similar assignment? Don’t know where to start? Don’t have time to work on this? Get a high-quality paper written for you from scratch – PLAGIARISM FREE, guaranteed to get you a good grade. To get started, please click on the Submit Your Instructions at the bottom of the page.

Many of you have learned about the OSI and many do not get how this is applicable beyond foundational knowledge.  I would like you to take another look at the OSI model and each layer discuss a possible security risk you see in each layer.  You will see a common theme by the end of the discussion.
Example:  Use only as example!
This week we discuss the security vulnerabilities that are found in each layer of the OSI model.  The physical layer is up first.  Vulnerabilities in the physical layer have been discussed extensively in previous weeks.  One possible security risk is for an adversary to infect a USB drive and then physically plug it in to a networked device.
The next layer is the data link layer.  It is the layer responsible for the transmission of data between nodes.  A security threat in this layer would be for a potential adversary to corrupt or alter data that is about to be sent through the node.  This would subsequently alter the data that is transmitted form its original and intended form.
The network layer is responsible for routing messages through different networks.  A vulnerability here could be a data worm that has infected a device in one network, being transported via the network layer to another network.  The worm will then be able to infect the devices within the new network.
The transport layer is the first in the upper layer and is responsible for breaking messages down in to pieces before sending them onward.  A potential vulnerability here is for the interception of unencrypted messages being sent through the transport layer by an adversary.
Session layer is next and is responsible for passwords exchanges, log offs, and termination of connections.  A vulnerability here would be an adversary keeping the gateway open and preventing the session layer from terminating the connection.  This would allow the adversary access to the data protected beyond the password gateway.
The presentation layer provides conversion service which cause character change sequences.  A vulnerability here could be an adversary corrupting the change sequence which would produce the incorrect data once it has been converted.
The final layer, the application layer is the layer most responsible for communication of the various applications being utilized.  One of the vulnerabilities present here would be the potential for a virus to cause the application layer to redirect data that flows through it.  
One of the common themes I see running through here is the spread of corruption and viruses.  Each layer has the potential to spread malicious content.  The conclusion this brings me to is that each layer must be properly defended with modern security protocols.
Jacobs, S. (2015) Engineering Information Security : The Application of Systems Engineering Concepts to Achieve Information Assurance


Need Writing Help? Our writing specialists are here 24/7, every day of the year, ready to support you! Instantly chat with an online tutor below or click here to submit your paper instructions to the writing team.

More than just an assignment.

Explore Now →

Who is this homework service for?

* If you are having a really hard class and want to get through it, then this is for you.

* If you have a medical emergency or someone close to you has a medical emergency and you don’t think you’ll be able to turn your assignment on time, this is definitely a service you could use.

* You can use us if you are having a tough Professor who won’t give you the grades you deserve.

* If you have a tight work schedule and you are getting points deducted for not submitting assignments on time.

* English might not be your first language and you feel like you are being left behind in class because of it.

* If you have a large project coming up and don’t think you have enough time to get it done well, definitely reach out to us.


Super stoked you are checking us out! We would like to help you with your assignment. We just need a few things from you:

* The full assignment instructions as they appear on your school account.

* If a Rubric is present, make sure to attach it.

* Any relevant weekly readings or learning resources.

* Include any special announcements or emails you might have gotten from your Professor regarding your assignment.

* Any templates or additional files required to complete the assignment.

If your assignment is somewhat complex and you need to explain it, please don’t hesitate to reach out to me via live chat. 



Frequently asked questions

How soon can I get my paper done?

It depends with your deadline. If you need your paper completed in 3 hours, we will deliver it in that time. All you need to do is indicate your deadline in our custom order page here. Alternatively, if you are sending us your instructions via email, please be sure to indicate your deadline.

Will it be completely original? I don't want to be caught in a case of Academic Integrity Violation.

We are as paranoid as you are. Maybe even more! And we understand that the greatest sin you can commit in your academic journey is plagiarizing your academic work. To that end, we have made sure that we check and double-check our papers using high quality plagiarism detection tools such as SafeAssign and Turnitin before submitting the paper to you.

Who is my writer? Is he/she a native English Speaker?

All our writers are native English Speakers. That is not to say that ESL writers are not good, we just prefer hiring native writers because we want the very best people working on your paper. This might mean paying a little bit more for your paper as opposed to when you pay a foreign company whose writers are non-native English Speakers.

What if I need revisions? Will your charge additional for this?

Of course not! If you do happen to require a revision on your paper, our team will handle it for you free of charge. Matter of fact, we won’t rest till you are happy with your paper. So, ask for as many revisions as you need, it’s completely FREE!

Will you give me my money back if I don't like my paper?

We have very few instances where we delivered a paper that a client didn’t fall in love with. But if it so happens that you don’t like your paper for any reason whatsoever, we’ll refund your money back no questions asked.

I have more assignments after this, can you help me with those too?

Of course! And what’s even better is that we can reserve a writer permanently to work on your entire class. This comes in handy for projects which build up on each other and where you need just one writer, one writing style.

I got my order information wrong, can I change that?

Yes you can. Just reach out to our support team via email ( or live chat here and they’ll help you change the instructions.

Can I place an order via email instead of going through the order page?

Yes you can. Email Anna at, she’s in charge of our sales team. Alternatively, you can talk to our Live Chat team here and request to speak to Anna.

Trusted by Thousands of Students

Delivering quality assignments since 2007

%d bloggers like this: