1 00:00:00,500 --> 00:00:07,940 So let's talk a little bit about the network and data link layer security, why is it important and 2 00:00:08,300 --> 00:00:11,470 how can we classify the network layer attacks, et cetera? 3 00:00:12,900 --> 00:00:19,980 When the OSI model was introduced, there is no thinking of any type of security, security just wasn't 4 00:00:20,310 --> 00:00:24,900 part of the design of either the USA or TCP IP models. 5 00:00:25,650 --> 00:00:31,860 Further, while there may be ozone layers, there are not necessarily protocols that correspond to them. 6 00:00:33,500 --> 00:00:40,880 Oh, yes, I was built to allow different layers to work without knowledge of each other, so any compromise 7 00:00:40,880 --> 00:00:44,540 in lower levels directly affects the higher level. 8 00:00:45,470 --> 00:00:50,630 As a result, a system is as secure as its weakest link. 9 00:00:52,010 --> 00:00:58,880 In other words, security is as strong as the weakest link right to when it comes to networking, layer 10 00:00:58,880 --> 00:01:01,340 two is one of the weakest links. 11 00:01:02,470 --> 00:01:08,470 The protocols developed in the early years of the Internet did not require a quality of service kiosk, 12 00:01:09,160 --> 00:01:13,520 for example, sure, delays in the protocols could be ignored. 13 00:01:13,840 --> 00:01:20,560 So the key principles of information security, CIA triad, confidentiality, integrity and availability 14 00:01:21,280 --> 00:01:25,600 were not integrated into the protocols or they are really weak. 15 00:01:26,020 --> 00:01:31,920 So we can classify the network and data link layer attacks according to the effects of the attacks. 16 00:01:32,830 --> 00:01:33,130 Right. 17 00:01:33,150 --> 00:01:40,840 So these classes are denying the traffic between two hosts, sniffing or listening to the traffic, 18 00:01:41,410 --> 00:01:45,040 compromising the transfer data and spoofing.