application , business , compliances , security

OSI 7498-2 Security Reference Model Function Layers

February 4, 2012

OSI Layers

OSI 7498-1 Network Model Description OSI 7498-2 Security Service

1

The Physical Layer contains the data represented as electronic bits. Data travels over a physical medium using specific transmission devices and media. Connection Confidentiality, Traffic Flow Confidentiality

2

The Data Link Layer organizes electronic bits into logical chunks of data — frames. A frame is a contiguous series of data with a common purpose. Framing allows the network to organize bits into a logical data unit and transmit them to the correct computer. Connection Confidentiality, Connectionless Confidentiality

3

The Network Layer contains all the specifications for the transmission and switching technologies needed to build circuits through a network of nodes and make routing decisions across the communication network. Peer Entity Authentication, Data Origin AuthenticationAccess Control ServiceConnection Confidentiality, Connectionless Confidentiality, Traffic Flow ConfidentialityConnection Integrity without RecoveryConnectionless Integrity

4

The Transport Layer organizes datagrams into segments and reliably delivers them to upper layer services. The Network Layer and Transport Layer work together in providing OSI networking functions. The Network layer moves data from point A to point B, and the Transport layer makes sure it finds the right service. Peer Entity Authentication, Data Origin AuthenticationAccess Control ServiceConnection Confidentiality, Connectionless Confidentiality, Traffic Flow ConfidentialityConnection Integrity with Recovery, Connection Integrity without RecoveryConnectionless Integrity

5

The Session Layer opens a dialog between sender and receiver and makes sure communications continue.  

6

The Presentation Layer transforms data into a mutually agreed upon format that each application can understand. Connection Confidentiality, Connectionless Confidentiality, Selective Field Confidentiality

7

The Application Layer provides network services (file, print, message, and application database services) to users (applications) of the network in a distributed processing environment. Peer Entity Authentication, Data Origin AuthenticationAccess Control ServiceConnection Confidentiality, Connectionless Confidentiality, Selective Field Confidentiality, Traffic Flow ConfidentialityConnection Integrity with Recovery, Connection Integrity without RecoverySelective Field Connection IntegrityConnectionless Integrity

Selective Field Connectionless Integrity

Non-repudiation with Proof of Origin

Non-repudiation with Proof of Delivery