Determine the importance of understanding the Transmission Control Protocol / Internet Protocol (TCP / IP) and Open Systems Interconnection (OSI) Reference models from the perspective of an ethical hacker.
Transmission Control Protocol/Internet Protocol reference model govern communications across different computers on the internet. The user gets to understand the process of packaging, sending, and receiving communication. The main TCP/IP protocols include HTTPS, HTTP, and FTP. On the other hand, the Open Systems Interconnection reference model plays the role of characterizing and standardizing communication between two computers on the internet. OSI helps guide vendors and network developers to ensure the programs they create operate effectively (Rouse, n.d). Hackers use the two reference models to undertake their activities. On the ethical point of view, the TCP/IP and OSI reference models guide the hacker towards determining the most appropriate system to use while hacking without interfering with the user's information. The lack of knowledge on these two reference models leads professionals into making users' information public on the internet leading to a breach of the internet privacy.
Compare and contrast physical, internetwork, host-to-host, and application layer threats
Comparison
The internetwork, application, host-to-host, and physical application layers function as avenues for communication between the computer and the internet. They are all responsible for delivering network and data services to specific computers in the network.
Contrast
Physical layer: It’s the first application layer in the network where the hub operates. It transmits raw bits over the communication channel (Acheson, 2014).
Host-to-host application layer: The Host-to-host layer, also called the transport layer, delivers data between the application and the internet layer, flow control, error control and recovery, and data segmentation. They make use of two main protocols, the TCP and the User Datagram Protocol (Acheson, 2014).
Internetwork: The internet work defines logical addressing and delivery packets. Unlike the Host-to-Host application layer, the internetwork layer uses Internet Protocol in the source and destination addresses. The IP facilitates movement of data between host-to-host layer and network access layer (Link) (Acheson, 2014).
Link: It defines the method of delivering data over the physical network and determines the most appropriate protocols for delivery of data. It also plays a role in error recovery and arbitration. It uses Address Resolution Protocol and Point-to-Point Protocol (Acheson, 2014).
The Host-to-Host layer is the most important when it comes to the security of networks and computer hosts. Also referred to as the transport network, it ensures data delivered between networks is free from errors. It also controls the flow of information and helps in data segmentation. The most significant control design for the Host-to-Host layer is the TCP and UDP because they help control the flow of data and information between various devices; hence, discovering threats.
References
Acheson, K. (2014, Apr 2). IT certificate and training blog: The seven layers of networking-Part
III. Boson. Retrieved July 10, 2016, from http://blog.boson.com/bid/102913/The-Seven-Layers-of-Networking-Part-III
Rouse, M. (n.d). OSI reference model (Open Systems Interconnection). TechTarget. Retrieved
July 10, 2016, from http://searchnetworking.techtarget.com/definition/OSI