Describe Physical layer attack in the Internet affecting confidentiality, integr
ID: 3814551 • Letter: D
Question
Describe Physical layer attack in the Internet affecting confidentiality, integrity and availability at various layers: Layer 1: Physical layer. describe typical attacks in that layer and the controls that are employed in the layer to minimize the attack or vulnerability that leads to the attack. For example, in the link and network layers, there can be packet sniffing attacks, in the IP (network layer), there could be spoofing attacks, and in various layers, there could be denial of service attacks. Be as specific and as complete as possible and cite your reference materials in your response.
Explanation / Answer
=> The physical layer is the first layer of the Open System Interconnection Model .
=> Physical layer is the only layer of OSI network model which actually deals with the physical connectivity of two
different stations.
Physical layer attacks
***********************
=> Physical security should be viewed differently than the controls and vulnerabilities at higher layers.
=> Physical security is a vital component of any overall security program.
=> If an attacker gains physical control of a device, it usually means it can be leveraged to control a device’s behavior.
=> This is what makes physical security such an important piece of overall security.
=> There are many angles that physical security can be attacked from (e.g., stealing data, lock picking, wiretapping,
and scanning, hardware modification).
=> Each angle offers a potential to gain access or understand how a security control works. Once an attacker can map the
security control, he or she is in a better position to bypass it.
=> Most of the tools needed to perform these attacks can be purchased online or in brick and mortar stores .
=> Stealing data is one of the easiest attacks for a malicious insider to attempt, probably because they already have access
to the system.
Preventing from attacks
************************
=> Communication security deals with the controls that can be implemented to prevent attackers
from physically accessing any part of a telecommunications infrastructure.
=> Communications security has been a longstanding concern.
=> The original controls for these vulnerabilities were named Tempest, which have now been changed to Emissions Security (Emsec).
=> The controls to limit EMR have also been updated. Newer technologies that have replaced simple shielding are white noise
and control zones. White noise uses special devices that send out a stream of frequencies that make it impossible for an
attacker to distinguish the real information.
information.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.