1 00:00:00,300 --> 00:00:06,270 So let's talk a little bit about the network and data link layer security. 2 00:00:06,420 --> 00:00:10,800 Why is it important and how can we classify the network layer attacks? 3 00:00:10,800 --> 00:00:11,580 ET cetera. 4 00:00:12,700 --> 00:00:18,370 When the OSI model was introduced, there was no thinking of any type of security. 5 00:00:18,400 --> 00:00:25,120 Security just wasn't part of the design of either the OSI or TCP IP models. 6 00:00:25,330 --> 00:00:31,990 Further, while there may be OSI layers, there are not necessarily protocols that correspond to them. 7 00:00:33,090 --> 00:00:38,660 You see, ozone was built to allow different layers to work without knowledge of each other. 8 00:00:38,670 --> 00:00:44,660 So any compromise in lower levels directly affects the higher levels. 9 00:00:45,340 --> 00:00:50,770 As a result, a system is as secure as its weakest link. 10 00:00:51,780 --> 00:00:56,250 In other words, security is as strong as the weakest link. 11 00:00:56,550 --> 00:00:57,090 Right. 12 00:00:57,090 --> 00:01:01,530 So when it comes to networking, layer two is one of the weakest links. 13 00:01:02,210 --> 00:01:07,640 The protocols developed in the early years of the Internet did not require a quality of service. 14 00:01:07,640 --> 00:01:08,660 QoS. 15 00:01:08,840 --> 00:01:13,640 For example, short delays in the protocols could be ignored. 16 00:01:13,640 --> 00:01:20,750 So the key principles of information security, CIA triad, confidentiality, integrity and availability 17 00:01:20,960 --> 00:01:25,750 were not integrated into the protocols, or they are really weak. 18 00:01:25,760 --> 00:01:32,150 So we can classify the network and data link layer attacks according to the effects of the attacks. 19 00:01:32,510 --> 00:01:33,020 Right. 20 00:01:33,020 --> 00:01:42,200 So these classes are denying the traffic between two hosts sniffing or listening to the traffic, compromising 21 00:01:42,200 --> 00:01:45,170 the transfer data and spoofing.