On Thu, 17 Apr 2008 12:39:01 CDT, RandallMan said: > Have been refreshing myself on CEH and CISSP studies. Looking over the OSI > model I noticed that all layers have been hacked! Perhaps its time for > another layer: > THE SECURE LAYER-LAYER 8. Perhaps this would fit true with a "layered" > approach to security.
On the other hand, implementing security at Layer 8 almost guarantees that it's a "bolt on after the fact". Also, "defense in depth" (which is what you probably *mean* by "layered" - multiple security layers) suggests that there should be components at all 7 layers. Everything from "Do it via copper rather than wireless" (a layer 1 issue) to "Deploy switches/configs that are resistant to MAC address spoofing" through crypto and other stuff at the higher layers...
pgpVGSUryG5FI.pgp
Description: PGP signature
_______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
