Name That OSI Model Layer: An Exercise in Cybersecurity

Do you want to be a cybersecurity professional? Learn this vocab and connect it to the OSI Model

Sean Byrne
4 min readApr 7, 2023
Learn about the OSI Model with this model. Photo by Oladimeji Odunsi

Intro

Studying is important to becoming a cybersecurity pro. So, try this exercise on your own once you get the gist of it.

IaaS

Definition:

Infrastructure as a Service (IaaS). A marketing term used to describe cloud-based systems that are delivered as a virtual solution for computing.

OSI Layer:

Layers 1–3 (Physical, Data, Network Layers)

At the Physical Layer, IaaS involves the physical hardware that provides the computing resources, such as servers, storage devices, and networking equipment. These resources are typically housed in data centers and provide the underlying infrastructure for IaaS services.

At the Data Link Layer, IaaS involves the network connections that provide connectivity between the physical hardware and the virtual resources that are created and managed by the IaaS provider. This may include the use of virtual LANs (VLANs) and virtual switches to segment traffic and provide isolation between different virtual environments.

At the Network Layer, IaaS involves the use of virtual networks and network protocols to provide connectivity between different virtual environments and to the outside world. This may include the use of virtual routers, firewalls, and load balancers to provide network services and security.

Additionally, IaaS can involve Layer 7: Application Layer, as it may provide access to applications and services that are hosted in the cloud.

PaaS

Definition:

Platform as a Service (PaaS). A marketing term used to describe the offering of a computing platform in the cloud.

OSI Layer:

Layer 7 (Application Layer)

At the Application Layer, PaaS involves providing a platform for developing, deploying, and managing applications in the cloud. PaaS providers typically offer a range of tools and services that enable developers to build and test applications, as well as manage the underlying infrastructure and deployment process.

Virtualization

Definition:

A technology used to enable a computer to have more than one OS present and operating at the same time. An abstraction of the OS layer, creating the ability to host multiple OSs on a single piece of hardware

OSI Layer:

Layers 1–3 and 7 (Physical, Data, Network and Application Layers)

At the Physical Layer, virtualization involves the underlying hardware that supports the virtualization layer, such as servers, storage devices, and networking equipment. These resources are used to create virtual machines that can run multiple operating systems on a single piece of hardware.

At the Data Link Layer, virtualization involves the use of virtual switches, virtual network interfaces, and other virtual networking components to provide connectivity between virtual machines and between virtual machines and the physical network.

At the Network Layer, virtualization involves the use of virtual networks and network protocols to provide connectivity between virtual machines and to the outside world. This may include the use of virtual routers, firewalls, and load balancers to provide network services and security.

Virtualization can also involve higher layers of the OSI model, such as Layer 7: Application Layer, as it enables the creation and management of virtual environments that can host applications and services.

Software-Defined Visibility

Definition:

An extension of the idea of infrastructure as code. Rather than have Next Gen Firewalls physically positioned in line of data flows, SDV accomplishes the same thing with code through the Software-Defined Network (SDN) fabric. This allows for flexibility in design and the ability to reconfigure on the fly.

OSI Layer:

Layers 2 and 3 (Data and Network Layers)

At the Data Link Layer, SDV involves the use of software-defined switches to control the flow of data through the network. This allows for greater control over network traffic and enables administrators to configure and manage the network more easily.

At the Network Layer, SDV involves the use of software-defined networking (SDN) to manage network traffic and provide visibility into the network. SDN enables administrators to define network policies and automate network operations, providing greater agility and flexibility in network design and configuration.

Overall, SDV is a network visibility technology that leverages the principles of software-defined networking to provide greater control and management over network traffic. While it can involve higher layers of the OSI model, such as Layer 7: Application Layer and above, it is primarily focused on the lower layers of the network stack.

MSSP

Definition:

Managed security service provider (MSSP). 3rd party that manages the security aspects of a system under some form of service agreement.

OSI Layer:

All layers (security is a concern at every layer of the network stack)

At the Physical Layer, MSSPs may provide physical security services such as access control and surveillance to protect the underlying hardware and infrastructure.

At the Data Link Layer, MSSPs may provide network security services such as intrusion detection and prevention, traffic monitoring, and network segmentation to protect against attacks that occur at this layer.

At the Network Layer, MSSPs may provide services such as firewalls, VPNs, and network access control to secure the network and protect against attacks that occur at this layer.

At higher layers of the OSI model, such as Layer 4: Transport Layer and Layer 7: Application Layer, MSSPs may provide security services such as encryption, authentication, and application-layer filtering to protect against attacks that occur at these layers.

Overall, MSSPs provide security services across multiple layers of the OSI model to ensure that systems and data are protected against a wide range of threats.

Conclusion

Try this same process with some other IT vocab. Remember, knowing the lingo and how it relates to the OSI Model will fast-track you to your cybersecurity career.

If you found this mildly useful then please subscribe to get notifications when I post new articles OR purchase some merch from my store on Redbubble.

Thanks for reading!

--

--