New Horizons Get Schooled Blog

Security in the Context of the Entire Network

Security in the Context of the Entire NetworkThe International Standards Organization (ISO) published a seven-layered Open Systems Interconnect (OSI) model that helps people understand how internetworking actually works. Often, when first introduced to the ISO/OSI model people ask where ‘Security’ fits in. The answer explains why so many students, returning adults and veterans choose to focus on security when creating their training plan.

Security professionals are among the most highly-paid, highly-respected IT experts in the industry. Here are some great reasons why.

How Networks are Built

When most people think about computer networks and what they consist of they’ll probably list servers, storage, switches, routers, cables, wireless, and client devices.

Starting in 1970 and culminating around 1983, the International Standards Organization (ISO) worked with the Comité Consultatif International Téléphonique et Télégraphique (CCITT) to develop a seven-layered abstract Basic Reference Model for Open Systems Interconnect (OSI). A tour through this model helps people understand how computer networks basically operate.

Moving outward from the user, data is entered into the network through software running on the Application layer. This application is running on a device-based operating system such as Windows at the Presentation layer which is signed in through the Session layer. Data is moved from that user to another destination by the Transport layer which uses the Network layer to connect to that destination. This connects to the actual network via a network interface card at the Data-Link layer which, finally, connects to the actual cabling and wireless infrastructure at the Physical layer.

5 Steps to Maxmimize your Cybersecurity Workforce

Arriving at the other end, the data travels back up the seven layers to arrive at its intended destination. Each layer has its own protocols and other communication standards that govern its efficient operation.

Where in the Model is Security?

Seems like an obvious question, and the short answer is “yes!”

Experts emphasize the importance of “multi-layer” security for a very good reason. If security is not efficiently and effectively embedded into every layer of the ISO-OSI model, every step along the path data takes from origin to destination, it is vulnerable and ineffective.

Imagine a building with seven doors providing entry. If all seven doors are locked, the building can be considered secure. If one is left unlocked, the entire building is insecure. It really is just that simple. Unless every layer of the network is secured, penetration can occur. Data can be compromised. And compromised data creates existential danger. According to Inc. Magazine, 60% of businesses whose data is significantly compromised go out of business and don’t return.

What is the Learning Path for Security Experts?

The answer to this question represents the most compelling reason for cross-training. Since assuring security exists at every level of the ISO/OSI model, students need to learn about each layer. There are communication standards and protocols at almost every layer, and the ability to manage security depends upon a solid understanding of the interaction between protocols at each layer with protocols at the adjacent layers.

Fortunately, your New Horizons counselor guides you through the various courses and experiences required to provide you with all the education required to achieve the most-recognized certifications in the security segment of the IT industry, including Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), CompTIA Security+, and Certified Ethical Hacker (CEH).

Cybersecurity Training and Certification at New Horizons

Posted on 10/30/18 8:00 AM by Get Schooled in cybersecurity

Get Schooled

Written by Get Schooled

Search by Topic

    Lists by Topic

    see all

    Be at the center of it all.


    Knowledge Ninjas

    a web-based service that allows software application end users to access a subject matter expert in real-time via a chat interface to resolve questions or problems they encounter in their specific software.