The open systems interconnection (OSI) model is inefficient; each layer must take the work of higher layers, add some result, and pass the work to lower layers. This process ends with the equivalent of a gift inside seven nested boxes, each one wrapped and sealed. Surely this wrapping (and unwrapping) is inefficient. From reading earlier chapters of this book, cite a security advantage of the layered approach.
Fill in the blank(s) with the appropriate word(s).
Modularity and encapsulation, least privilege, least common mechanism.
Obviously, the physical layer has to be at the bottom of the OSI stack, with applications at the top. Justify the order of the other five layers as moving from low to high abstraction.
You might also like to view...
Match the following Web browser to its description:
I. World Wide Web II. Mosaic III. Netscape Navigator IV. Internet Explorer V. Chrome A. popular browser provided by Microsoft B. newest of the common Web browsers used today C. first to add secure communications; can now conduct business via Internet D. first browser created by Tim Berners-Lee E. first to embed graphical elements; created by Marc Andreessen
On a line chart, the y-axis is also known as the:
A) category axis. B) legend axis. C) base axis. D) value axis.