The open systems interconnection (OSI) model is inefficient; each layer must take the work of higher layers, add some result, and pass the work to lower layers. This process ends with the equivalent of a gift inside seven nested boxes, each one wrapped and sealed. Surely this wrapping (and unwrapping) is inefficient. From reading earlier chapters of this book, cite a security advantage of the
layered approach.
What will be an ideal response?
Example
answers:
Modularity
and
encapsulation,
least
privilege,
least
common
mechanism.
Computer Science & Information Technology
You might also like to view...
Create a movie that changes the edge detection amount over time.
What will be an ideal response?
Computer Science & Information Technology
The chip carrier is also referred to as a motherboard or mainboard.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology