Computer Security
The Open Systems Interconnection (OSI) model is a guiding principle in online system design. By working from the OSI model, you could ensure that your employerâs online environment could accommodate interoperability among different online software products and services.
> Draw a chart for the OSI model and their numbers from top to bottom.
> Name three problems with cabling and the methods to counteract those issues.
> How do you protect your employerâs domain name from being hijacked?
Sample Solution
OSI Model
Here's a chart of the OSI model with layers numbered from top (7) to bottom (1):
Layer Number | Layer Name | Description |
---|---|---|
7 | Application Layer | Provides user applications like web browsers, email clients, and file transfer programs with network services. |
6 | Presentation Layer | Handles data formatting and encryption/decryption. |
5 | Session Layer | Establishes, manages, and terminates sessions between communicating applications. |
4 | Transport Layer | Provides reliable data transfer services and ensures data arrives correctly. |
3 | Network Layer | Routes data packets across networks using logical network addresses (IP addresses). |
2 | Data Link Layer | Transmits data packets over the physical network media (cables or wireless) and manages error detection/correction. |
1 | Physical Layer | Defines the physical characteristics of network transmission media (cables, connectors) and electrical or optical signal transmission. |
Full Answer Section
Cabling Problems and Solutions Here are three common cabling problems and methods to counteract them:- Cable Damage:
- Problem:Physical damage to cables (cuts, crimps, fraying) can disrupt signal transmission.
- Solution:Visually inspect cables for damage and replace any faulty ones. Use cable protectors in high-traffic areas.
- Signal Attenuation:
- Problem:Signal strength weakens over distance, particularly in long cable runs.
- Solution:Use cables with the appropriate gauge (thickness) for the desired distance. Utilize signal boosters or repeaters for extended cable lengths.
- Crosstalk:
- Problem:Electrical interference between nearby cables can corrupt data transmission.
- Solution:Maintain proper cable separation to minimize crosstalk. Use shielded cables where necessary.
- Domain Registrar Lock:Enable a domain registrar lock to prevent unauthorized transfers of the domain name.
- Strong Passwords and Two-Factor Authentication:Use strong passwords and two-factor authentication for domain registrar accounts to add an extra layer of security.
- Monitoring Services:Utilize domain name monitoring services that alert you to any suspicious activity related to your domain name, such as transfer attempts.
- Regular Reviews:Periodically review domain registration details and ensure contact information is accurate and up-to-date.
- Consider Domain Privacy Protection:Domain privacy protection services mask your personal information associated with the domain name registration, making it less attractive to potential hijackers.