The Undocumented Layers of the OSI Model and Their Impact on Security

The biggest threat to data security doesn’t come from hackers, misconfigured firewalls, missing patches, or negligent employees. Nor is it in the application layer of the Open Systems Interconnection (OSI) Basic Model. Instead, there are three undocumented layers of the OSI Model that exert a huge influence on security decisions and the integrity of security programs. Learn about those layers and how to manage the threat.

Featured Software Research:

ExecBlueprints: Device-Reliant vs. Data-Reliant: How Mobile and Cloud Technologies Influence Workflow

Cloud computing offers an extremely cost-effective alternative to traditional hardware-based infrastructures, but the advantages in flexibility and price must be weighed against issues of security, reliability, and capability. Business unit leaders must partner with IT to determine their needs, understand the impact of new technologies, and chart a path forward together to facilitate stability and efficiency across the entire organization.   Read More

The Skillsoft Impact Analysis: The Fast Track to Gaining Powerful Insights into the Strengths and Opportunities of Your Elearning Investment

In this age of big data, decision makers on all levels are clamoring for business-driven data regarding the effectiveness of human capital investments. Hard quantifiable evidence, like business impact or ROI, can be complex and seem out of reach in the face of rapid change and constrained L&D resources. This paper introduces a simplified process and toolkit, and shares some of the key findings uncovered since its inception. Read More

You may also be interested in these related documents:

Understanding the PCI Data Security Standard

The payment card industry data security standard (PCI DSS) defines a comprehensive set of requirements to enhance and enforce payment account data security in a proactive rather than passive way. These include security management, policies, procedures, network architectures, software design, and other protective measures. Get a better understanding of the PCC DSS and learn the costs and benefits of compliance. Read More

A Layered Security Strategy for Preventing Data Leakage, Theft, and Insider Abuse

  • Source: Tizor
  • Written By:
  • Published:
Threats to data content posed by insiders. Compliance regulations entailing stringent data controls. It’s hardly surprising companies need to find more secure methods for keeping confidential data under lock and key. Learn about managing security challenges across three important layers of your IT infrastructure, and how database activity monitoring (DAM) and database auditing and protection (DAP) can help you. Read More

2008 Internet Security Trends: A Report on Emerging Attack Platforms for Spam, Viruses, and Malware

Just when malware design seemed to have reached a plateau, new and more complex attack techniques have now emerged. For a while, security controls designed to manage spam, viruses, and malware were working, but as a result of this success, the threats they protected against were forced to change. Learn about today’s key security trends and how you can fight against the sophisticated new generation of Internet threats. Read More
 
comments powered by Disqus