The open systems interconnection (OSI) model is inefficient; each layer must take the work of higher layers, add some result, and pass the work to lower layers. This process ends with the equivalent of a gift inside seven nested boxes, each one wrapped and sealed. Surely this wrapping (and unwrapping) is inefficient. From reading earlier chapters of this book, cite a security advantage of the

layered approach.

What will be an ideal response?

Example
answers:
Modularity
and
encapsulation,
least
privilege,
least
common
mechanism.

Computer Science & Information Technology

You might also like to view...

Create a movie that changes the edge detection amount over time.

What will be an ideal response?

Computer Science & Information Technology

The chip carrier is also referred to as a motherboard or mainboard.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology