1 00:00:00,530 --> 00:00:06,050 ‫So let's talk a little bit about the network and data link layer security. 2 00:00:06,680 --> 00:00:11,420 ‫Why is it important and how can we classify the network layer attacks, et cetera? 3 00:00:12,900 --> 00:00:18,210 ‫When Osai model was introduced, there is no thinking of any type of security. 4 00:00:18,450 --> 00:00:24,870 ‫Security just wasn't part of the design of either the OSAI or TCP IP models. 5 00:00:25,650 --> 00:00:31,830 ‫Further, while there may be osai layers, there are not necessarily protocols that correspond to them. 6 00:00:33,200 --> 00:00:40,850 ‫See, OCI was built to allow different layers to work without knowledge of each other, so any compromise 7 00:00:40,850 --> 00:00:44,480 ‫in lower levels directly affects the higher level. 8 00:00:45,500 --> 00:00:50,600 ‫As a result, a system is as secure as its weakest link. 9 00:00:52,010 --> 00:00:56,990 ‫In other words, security is as strong as the weakest link, right? 10 00:00:57,350 --> 00:01:01,310 ‫So when it comes to networking, layer two is one of the weakest links. 11 00:01:02,470 --> 00:01:07,960 ‫The protocols developed in the early years of the internet did not require a quality of service que 12 00:01:07,960 --> 00:01:13,510 ‫os, for example, short delays in the protocols could be ignored. 13 00:01:13,840 --> 00:01:20,560 ‫So the key principles of information security, CIA triad, confidentiality, integrity and availability 14 00:01:21,280 --> 00:01:28,540 ‫were not integrated into the protocols or they are really weak so we can classify the network and data 15 00:01:28,540 --> 00:01:31,930 ‫link layer attacks according to the effects of the attacks. 16 00:01:32,830 --> 00:01:33,130 ‫Right. 17 00:01:33,130 --> 00:01:42,280 ‫So these classes are denying the traffic between two hosts sniffing or listening to the traffic, compromising 18 00:01:42,280 --> 00:01:45,010 ‫the transferred data and spoofing.