Exercise
Kevin Mitnick is an American Security expert and called the “World’s most famous hacker”. He was arrested twice for cyber crime and wire fraud; an event quoted as the “manhunt”. Read more and find out such interesting facts about Kevin Mitnick.
You may watch the following movies and TV series and learn a trick or two.. Hackers- 1995 Mr. Robot (TV series)
Read about some other types of hackers, such as: Script Kiddies Elite Hackers State Sponsored Hackers Hacktivists Phreaks
Read more about Indian cyber laws and the Indian IT act.
OSI Model So, we have seen the TCP/IP Model. Actually this was a derived model and is used today. But the original model on which the TCP/IP model was based, is called the OSI Model. This model has 7 layers, instead of 4 that we see in the TCP/IP model. The essential overall function of both the models remains the same, just that in the OSI model their work has been split into 7 layers. Now let us look at the function of each layer of the OSI model in detail. So, just like in the TCP/IP model, the data in the OSI model also passes from layer 7 to layer 1 at the sender’s end and from layer 1 to layer 7 at the receiver’s end. Application Layer- This layer provides an interactive interface for the user to enter and view data. One can give inputs in the form of text, audio, images, files, etc. The browser makes up the application layer. Presentation Layer- After the application layer, the data passes to the presentation layer. This is where the data is converted into computer friendly format, i.e in binary code. So, the presentation layer encodes the input, compresses it, and encrypts it if required. Then the data is sent to the next layer. Session Layer- This layer initiates a connection and creates a session, so that some context can be provided to the communication between the two devices. Transport Layer- This layer establishes an application level connectivity. For this, it attaches the source and destination port numbers. It also performs the task of error control, which means that it makes a checklist, so that it can be cross checked at the receiving end to ensure that all the data is transferred properly and not destroyed on the way. These checklists are known as checksums. Network Layer- At the network layer, the source and destination IP addresses are attached, for the purpose of identification of devices, and to decide the virtual path that needs to be taken by the data packet. So, we can say that this layer does network level routing and pathing of packets. Data Link Layer- This layer attaches the source and destination MAC addresses, which are used to identify the hardware of the device. It also calculates checksums for error checking of the metadata that has been attached at all the previous layers, and also to manage the flow of data. Physical Layer- This is where the data is converted to hardware friendly signals, like radio signals, light signals, or electric signals, depending on the hardware that is being used for data transfer. This is the order in which the data passes at the sender’s end. At the receiver’s end, the order of the layers is reversed. Now, don’t worry if you cannot remember all this information. We have some simple tricks for you. A simple mnemonic that can used to remember the order of the layers from layer 7 to layer 1 is: All People Seem To Need Data Processing So that was all about the OSI model.
Last updated