Chapter 135: OSI Model - (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (2023)

OSI Model

Communication between computers over networks is made possible through protocols. ONEProtocolis a set of rules and restrictions that determine how data is transmitted over a network medium (eg twisted pair cable, wireless transmission). The International Organization for Standardization (ISO) developed the Open Systems Interconnection (OSI) reference model for protocols in the late 1970s.

History fon Mold OSI Model

TheOSI Report Model(more commonly calledOSIit was not the first or only attempt to create a common communication standard. In fact, the most widely used protocol today, TCP/IP (which is based on the Defense Advanced Research Projects Agency (DARPA) model and is also known today as the TCP/IP model), was developed in the early 1970s. OSI was not developed until the late 1970s (and not officially published as the ISO 7498 standard until 1984).

TheOSI Modelwas developed to create a common communication structure or standard for all computer systems. The OSI model serves as an abstract framework or theoretical model of how protocols should work in an ideal world on ideal hardware. The OSI model has become a common reference point.

OSI Functionality

The OSI model divides network operations into seven layers. Each layer is responsible for performing specific tasks or functions, with the ultimate goal of supporting data exchange (in other words, network communication) between two computers. They are listed either by their name or their shift number. The levels are specifically classified to show how information flows through the different levels of communication. Each layer communicates directly with the layers above and below.

Chapter 135: OSI Model - (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (1)

IMAGE 11.1 The OSI Model

Encapsulation/Decapsulation

The OSI model represents a protocol stack, which is a layered collection of multiple protocols (ie, a multi-layer protocol). Communication between protocol layers is done through encapsulation and decapsulation.Encapsulationis the addition of a header and possibly a footer to the data that each layer receives from the layer above before passing it to the layer below. As the message is encapsulated at each layer, the header and payload of the previous layer become the payload of the current layer. The reverse action that occurs as data flows through the layers of the OSI model from the physical layer to the application is known as (note: sometimes the term decapsulation is used, but the Internet Engineering Task Force (IETF) uses the term decapsulation used. ) The encapsulation/decapsulation process proceeds as follows:

1. The application layer receives data from the software. The application layer encapsulates the message by adding information to it. The information is usually only added to the beginning of the message (called a header). However, some layers also add material to the end of the message (called a footer), as shown inImageThe application layer passes the encapsulated message to the presentation layer.

2. The process of routing the message and adding layer-specific information continues until the message reaches the physical layer.

3. At the physical level, the message is converted into electrical pulses representing bits and transmitted over the physical link.

4. The receiving computer captures the physical link bits, reconstructs the message at the physical layer, and sends the message at the data link layer.

5. The data link layer removes its information and sends the message to the network layer.

6. This decapsulation process is performed until the message reaches the application layer.

7.When the message reaches the application layer, the data in the message is sent to the intended software recipient.

Chapter 135: OSI Model - (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (2)

IMAGE 11.2 OSI Model Encapsulation

The information extracted from each layer contains instructions, checksums, etc. that can only be understood by the peer that originally added or created the information (seeImageThis is known asPeer layer

Chapter 135: OSI Model - (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (3)

IMAGE 11.3 The OSI Model Peer layer logically channels

Data sent in the application layer protocol stack (Layer 7) is encapsulated in a network container. TheProtocol Data Unit (PDU)it is then passed to the presentation layer (Layer 6), which in turn passes it to the session layer (Layer 5). This network container is called a PDU at layers 7, 6, and 5. Once the network container reaches the transport layer (Layer 4), it is referred to as aDepartment(TCP) or aDatagramm(User Data Protocol [UDP]). At the network layer (Layer 3) it says: At the data link layer (Layer 2) it says: At the physical layer (Layer 1) the network container becomesBitsfor transmission over the physical connection medium.Image 11.4Displays the label applied to the network container at each level.

Chapter 135: OSI Model - (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (4)

IMAGE 11.4 OSI Model based on the mattress network Container names

OSI The law

By understanding the roles and responsibilities of each layer of the OSI model, you can better understand how network communications work, how attacks can occur, and how security can be applied to protect network communications.

I remember Mold OSI

Mnemonics can help you remember the layers of the OSI model in order: Application, Presentation, Session, Transport, Network, Data Link, and Physical (from top to bottom). Examples include: "Please Don't Teach Surly People Acronyms" (physical level to application level) and "Every President since Truman has never smoked pot" (application level to physical level).

Application layer

TheApplication layer (Layer 7)is responsible for connecting user applications, network services, or the operating system to the protocol stack. The software application is not at this level. Instead, it contains the protocols and services needed to transfer files, exchange messages, connect to remote terminals, etc.

presentation layer

Thepresentation layer (Layer 6)is responsible for converting data into a format that can be understood by any system that follows the OSI model. Defines common or standard structure and formatting rules for data. The presentation layer is also responsible for encryption and compression.

There is no real presentation layer in TCP/IP networks. Currently, there is no need to reshape data for network transport, and protocol stack compression is only done in conjunction with some encryption functions. Encryption associated with network communications can occur in at least five places:

•Encryption before the network, where software encrypts data before sending it to the application layer

•Transport layer encryption, typically performed by TLS

•VPN encryption, which can be level 2, 3 or 4 depending on the VPN technology used (eg L2TP, IPsec or OpenVPN).

•Wireless data link level encryption

•Physical layer bulk encryption (provided by a device outside the NIC)

meeting layer

Themeeting layer (Layer 5)is responsible for establishing, maintaining and terminating communication sessions between two computers. Manages dialog discipline or dialog control (simple, half-duplex, full-duplex), establishes checkpoints for grouping and recovery, and retransmits PDUs that have failed or been lost since the last checkpoint checked.

There is no real session layer in TCP/IP networks. Session layer functions are handled by TCP at the transport layer or not at all when UDP is used.

Chapter 135: OSI Model - (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide (5)

Communication sessions can be conducted in one of three different modes of discipline or control:

Simplex:one-way communication

Half duplex:Two-way communication, but only one direction can send data at a time

Vollduplex:Two-way communication, where data can be sent in both directions at the same time

Transport layer

TheTransport layer (Layer 4)is responsible for maintaining the integrity of a connection and controlling the session. The transport layer establishes communication between nodes (also known as devices) and defines the rules of a session. Session rules determine how much data each segment can contain, how message integrity is checked, and how data loss is determined. Session rules are established through a handshake process. (For more information on TCP's three-way SYN/ACK handshake, see "Transport Layer Protocols" later in this chapter.)

The transport layer creates a logical connection between two devices and provides end-to-end transport services to ensure data delivery. This layer includes mechanisms for segmentation, sequencing, error control, data flow control, error correction, multiplexing, and optimization of network services. The following protocols operate within the transport layer:

•Transmission Control Protocol (TCP)

•Πρωτόκολλο User Datagram (UDP)

•Transport Layer Security (TLS)

network layer

Thenetwork layer (Layer 3)is responsible for logical addressing and routing. Logical addressing occurs when an address is assigned and used by software or protocol instead of being provided and controlled by hardware. The network layer packet header contains the source and destination IP addresses.

The network layer is responsible for providing routing or delivery instructions, but is not responsible for verifying guaranteed delivery. The network layer also manages debugging and node traffic (ie traffic control).

non ip, the Legacy, log

non IP logare protocols that serve as an alternative to IP at the OSI network layer (3). With the dominance and success of TCP/IP, non-IP protocols (ie.legacyhave become the purview of specialized networks such as IPX, AppleTalk, and NetBEUI. Because non-IP protocols are rare, most firewalls cannot perform header, address, or payload content filtering on these protocols. Also, non-IP protocols can be encapsulated in IP for Internet communication. Therefore, older protocols should be blocked.

A router is the primary network hardware device that operates at Layer 3. Routers determine the best logical path for packet transmission based on speed, hops, preferences, etc. Routers use the destination IP address to control the transmission of packets.

route guidance log

There are two major categoriesInternal route guidancedistance vector and link state.distance Vector route guidance logMaintain a list of destination networks along with direction and distance metrics, measured in hops (in other words, the number of routers you need to traverse to reach the destination).shortest way Condition route guidance logGather router characteristics such as speed, latency, error rates, and actual monetary cost of use. This information is tabulated to make a next-hop routing decision. Common examples of distance vector routing protocols are:route guidance Information Protocol (REST IN PEACE)AndInternal Tor route guidance ProtocolCommon examples of link state routing protocols are:Open shorter Away First (OSPF)Andintermediate System To intermediate SystemThere is also a widely used extended distance vector routing protocol that replaces IGRP:advanced Internal Tor route guidance Protocol

There is one main categoryOutside route guidance logthis is called the path vector.Away Vector route guidance logMake next-hop decisions based on the total remaining path (i.e. vector) to the destination. This differs from internal routing protocols, which make next-hop decisions based solely on information related to the immediate next hop. Internal routing protocols are myopic, while external routing protocols are far-sighted. The main example of a path vector protocol isBorder Tor Protocol

Route security can be enforced by configuring routers to accept route updates only from other authenticated routers. Administrative access to a router should be physically and logically limited to only certain authorized entities. It's also important to keep your router's firmware up to date.

Data shortest way layer

TheData shortest way layer (Layer 2)is responsible for formatting the packet for transmission. The correct format is determined by the network hardware, topology, and technology, such as Ethernet (IEEE 802.3).

Part of the processing performed on the network container within the data link layer involves adding the source and destination hardware addresses to the frame. TheUtensils, accessories Addressit's themedia Access control (MAC)This is a 6 byte (48 bit) binary address written in hexadecimal notation (eg 00-13-02-1F-58-F5). This address is also known asphysicallyMoldNICandEthernetThe first 3 bytes (24 bits) of the address are theorganizational unique IdentifierThis indicates the provider or manufacturer of the physical network interface. OUIs are registered with the Institute of Electrical and Electronics Engineers (IEEE), which controls their publication. The OUI can be used to identify the manufacturer of a NIC through the IEEE website at . The last 3 bytes (24 bits) of the MAC address represent a unique number assigned to this interface by the manufacturer. Some manufacturers encode information in these last 24 bits, which can represent the make, model, and production run along with a unique value. Therefore, some devices (eg, mobile devices, IoT devices, and embedded systems) that use a unique network card can be identified by their MAC address.

Among the protocols at the data link layer (Layer 2) of the OSI model, you should be familiar with the Address Resolution Protocol (ARP). See "ARP Concerns" later in this chapter for more information.

Network hardware devices that operate at layer 2, the data link layer, are switches and bridges. These devices support MAC-based traffic routing. Switches receive a frame on one port and forward it to another port based on the destination MAC address. Destination MAC addresses are used to determine whether a frame will be transmitted across the bridge from one network segment to another.

Physically layer

ThePhysically layer (Layer 1)converts a frame into bits for transmission over the physical link medium and vice versa for receiving communications.

Network hardware devices that operate at layer 1, the physical layer, are NICs, hubs, repeaters, concentrators, and amplifiers. These devices perform hardware-based signaling functions, e.g. B. Sending a signal from one connecting port to all other ports (a hub) or amplifying the signal to support longer transmission distances (a repeater).

FAQs

How hard is the CISP exam? ›

However, before you appear for the examination, you should know the difficulty in passing the exam. To answer the question- how hard is the CISSP exam? It is considerably tough. The course is designed in such a way that it makes sure that the people who crack it are well-suited for this industry.

What is the fail rate for CISSP? ›

Let's take a look at the CISSP certification exam details: The CISSP pass rate is about 20%.

Is CISSP harder than security Plus? ›

The CISSP exam is more comprehensive, covering topics such as access control, cryptography, and network security. As a result, it is generally seen as more difficult to pass than the Security+ exam. However, the CISSP certification is also more widely recognized by employers.

How many times can you fail CISSP? ›

You can take the CISSP exam up to three times within a 12-month period. For both the CISSP CAT and linear examinations: If you don't pass the exam the first time, you can retest after 30 days. If a you don't pass the exam on the second attempt, you can retest after an additional 90 days.

Can you pass CISSP without experience? ›

A candidate who doesn't have the required experience to become a CISSP may become an Associate of (ISC)² by successfully passing the CISSP examination. The Associate of (ISC)² will then have six years to earn the five years required experience.

Is CISSP equivalent to Masters degree? ›

RFQ Level 7 means that earning the CISSP is considered an educational achievement that is the same level needed to achieve a Master's degree, according to U.K. NARIC. Within the RQF levels, qualifications are not all required to demonstrate the same amount of study or assessment time.

Can a beginner pass CISSP? ›

You can take the CISSP exam without any experience, while not recommended, and then you'll have 6 years to complete your 5 years of industry experience. After that, you officially submit your endorsement to become an official CISSP, and then you can start using those letters after your name.

What is the expected salary for CISSP? ›

What Is the Average Cissp Salary by State
StateAnnual SalaryHourly Wage
South Carolina$128,505$61.78
California$126,616$60.87
Massachusetts$126,097$60.62
New Hampshire$125,950$60.55
46 more rows

Can I pass CISSP in a month? ›

For Risk Management professionals find 60-70 hours of time quite sufficient to pass the CISSP exam. For IT professionals, 40-50 hours of study should be sufficient to clear the exam. The ISC2 material is a must-have for all professionals.

Why is CISSP so difficult? ›

The Certified Information Systems Security Professional (CISSP) exam is widely considered to be a challenging and difficult exam due to several factors: Prior Knowledge and Experience: Candidates who have prior knowledge and experience in the field of information security may find the exam less challenging.

Does a CISSP expire? ›

The CISSP credential is valid for three years; holders renew either by submitting 40 Continuing Professional Education (CPE) credits per year over three years or re-taking the exam. CPE credits are gained by completing relevant professional education.

What happens if you fail the CISSP? ›

" What if I fail the exam? "

According to the retake policy on the (ISC)² website, if you fail, you can take the test again after 30 days, and if you fail again, you must wait 90 days (then 180 days), but you cannot take the exam more than three times in a 12-month period.

How many people pass the CISSP the first time? ›

Also, if you have this cyber security course certificate, you will be considered one of the sought-after candidates by the different employers. Passing this examination is tough, and that is why you need to make sure to study properly. However, on average, 50% to 60% of candidates who give the examination pass it.

How many hours of study do you need to pass CISSP? ›

Risk management professionals find 60-70 hours of time for preparation quite adequate to clear the CISSP exam. IT professionals would need less time – 40-50 hours of study should suffice to clear the exam.

Is the CISSP exam open book? ›

The CISSP exam is not open book. Candidates are not allowed to bring in any materials other than what is provided by (ISC)².

Can you self study for CISSP? ›

CISSP is a very theoretical exam. If you are coming from a technical background, you need to ease yourself into it, its not something that you can just dive into and just get it right away. Its like studying a Novel. Yes that's right, you have to pay attention to the comprehension, the wording.

Can I take CISSP from home? ›

Candidates who meet the qualifications, understand and agree to the conditions and are interested in registering for a certification examination as part of the (ISC)² online proctoring pilot test, can register today with Pearson VUE at https://home.pearsonvue.com/isc2/onvue.

Do you need a degree for CISSP? ›

A four-year college degree, or regional equivalent, an additional, (ISC)²-approved credential, or an education credit count for only one of the five years required to earn the full CISSP certification.

Can I put CISSP after my name? ›

In this field, CISSP is recognized as the highest credential, and most people take five years to earn it. Therefore, it can go next to your name.

Should I get an MBA or a masters in cybersecurity? ›

On the positive side, if you want to keep your career options open and aren't ready to commit fully to a career in cybersecurity, an MBA offers greater flexibility because it is not as specialized (as a master of science in cybersecurity) and can be applied to a broad array of fields.

Can CISSP get you a job? ›

The most common job positions for CISSP holders include the following: Chief information security officer. Security systems administrator. Information assurance analyst.

What professions generally get a CISSP? ›

Job functions and job titles that commonly hold the CISSP certification
  • Cybersecurity / IT Security. Information Security. Security Engineer or Analyst. Security Manager or Director. CISO / CSO / ISO.
  • Audit / IT Compliance. IT Audit Manager. IT Auditor. IT Compliance.
  • Executive (C-level) Director. CIO – Chief Information Officer.

What is the salary of CISSP in California? ›

How much does a Cissp make in California? As of May 21, 2023, the average annual pay for the Cissp jobs category in California is $126,616 a year. Just in case you need a simple salary calculator, that works out to be approximately $60.87 an hour. This is the equivalent of $2,434/week or $10,551/month.

How many people are CISSP certified? ›

CISSP logo

As of July, 2022 there are 156,054 (ISC)² members holding the CISSP certification worldwide.

What is passing grade for CISSP? ›

To pass the CISSP exam, you must obtain a minimum passing score of 700. You only receive a score of pass or fail. If you fail the exam, (ISC)2 reveals some details of your performance. You will receive a ranking of the exam domains according to the percentage of questions you answered correctly.

Can I take CISSP without 5 years experience? ›

Here is what you need to become a CISSP

Candidates may receive a one year experience waiver with a 4-year college degree, or regional equivalent or additional credential from the (ISC)² approved list. Don't have 5 years experience? No problem. You can become an Associate of (ISC)² just by passing the CISSP exam.

How much is a CISSP exam? ›

The CISSP certification exam costs $749. Individuals can receive vouchers from partner organizations after completing CISSP exam training courses.

Can you pass CISSP in a week? ›

I have had students who studied for one week and passed their exam and I have had others that been over a year. Normal is somewhere between four to six months, and it varies so much because everybody comes into the CISSP studying from a different point of view.

Why do people fail CISSP? ›

It gets stressful and is oftentimes overwhelming. That overwhelm leads to poor preparations, which often leads to exam failure. The truth is if you use too much stuff, you end up with “information overload”. This will almost certainly lead you to fail the CISSP exam – at least once.

Is CISSP in high demand? ›

CISSP professionals are in high demand across industries due to their advanced knowledge and ability to defend against data breaches and improve security measures.

Is the CISSP all multiple choice? ›

CISSP Exam Overview:

The CISSP or Certified Information Systems Security Professional credential is made up of 150 multiple-choice questions that you must answer in 180 minutes or 3 hours.

How soon can you retake the CISSP exam? ›

Please note there is a 30-day waiting period after your first exam before you can take the second attempt. This promotion applies to the following exams only: CISSP, CCSP, SSCP, CSSLP, CGRC, CISSP-ISSAP, CISSP-ISSEP and CISSP-ISSMP. Offer not valid for HCISPP or CC exams.

Are there dumps for CISSP? ›

Can I Pass Cissp with Dumps? The answer is Yes, you Can pass your Cissp Exam on the first attempt with Dumpsgate updated Cissp exam questions PDF. We arrange 900+ Exam questions that cover all Cissp 8 domains. All Questions have detailed answers.

How to prepare for CISSP in 30 days? ›

Set aside a regular study time.

If you can devote 90 minutes per day over the next 30 days to get through this process, by day 30 you'll have spent 45 hours of study time preparing for the CISSP.

What is the hardest exam in cyber security? ›

The CISSP credential is the most respected certification in cybersecurity. Earning this certification shows your knowledge and skill in the field, which can help you advance your career and become part of a community of leaders in cybersecurity. CISSP is a very difficult certification to get.

How long is the CISSP exam good for? ›

How long is the CISSP certification good for? While the CISSP certification is valid for three years, there are certain requirements for (ISC)² certified members and associates to maintain their membership, certification and active status.

How long does it take to get CISP? ›

To earn CISSP certification, you must first meet requirements for work experience, education and professional credentials. Candidates may have five years of relevant work experience, or four years if they also hold a related undergraduate degree or an (ISC)²-approved credential.

How do I prepare for CISP? ›

Important Tips for Passing the CISSP Exam
  1. Know why you are taking the CISSP exam.
  2. understand the CISSP exam's covered domains.
  3. Don't rely solely on one study resource.
  4. Take practice tests and mock examinations.
  5. Organize study groups in person or online.
  6. Study using the most effective teaching methods.
Feb 8, 2023

What is the pass rate for the first time CISSP exam? ›

Also, if you have this cyber security course certificate, you will be considered one of the sought-after candidates by the different employers. Passing this examination is tough, and that is why you need to make sure to study properly. However, on average, 50% to 60% of candidates who give the examination pass it.

What is the pass rate for the CISM exam? ›

There is clear evidence that CISM difficulty is incredible, based on the fact that only 50-60% of first-time test-takers succeed. It is a challenging exam with many questions that will test your technical understanding. Passing this exam is not impossible.

Can a beginner take CISSP? ›

You can take the CISSP exam without any experience, while not recommended, and then you'll have 6 years to complete your 5 years of industry experience. After that, you officially submit your endorsement to become an official CISSP, and then you can start using those letters after your name.

How much does IT cost to get CISSP certified? ›

The CISSP certification exam costs $749. Individuals can receive vouchers from partner organizations after completing CISSP exam training courses.

How hard is IT to get a cyber security certificate? ›

Although degrees in cyber security are typically not as tough as those in research- or lab-intensive fields like science and engineering, they are generally more challenging than non-research degrees like those in the humanities or business.

How many hours to study for CISSP? ›

For something as big and as complex as the CISSP, I suggest you study at least two to three hours every day, and when I say every day, I actually mean it. It is every day. And many of my students say, “Well, I can't just find two hours in the day or three. I can't make more hours in the day than there are.”

What happens if you fail CISSP? ›

" What if I fail the exam? "

According to the retake policy on the (ISC)² website, if you fail, you can take the test again after 30 days, and if you fail again, you must wait 90 days (then 180 days), but you cannot take the exam more than three times in a 12-month period.

What is the passing grade for the CISSP exam? ›

The questions are weighted differently, adding up to 1,000 points. To pass the CISSP exam, you must obtain a minimum passing score of 700. You only receive a score of pass or fail.

How many people have passed the CISSP? ›

As of July, 2022 there are 156,054 (ISC)² members holding the CISSP certification worldwide. In June 2004, the CISSP designation was accredited under the ANSI ISO/IEC Standard 17024:2003.

What is the salary for CISM in USA? ›

Cism Salary
Annual SalaryMonthly Pay
Top Earners$153,500$12,791
75th Percentile$130,000$10,833
Average$101,668$8,472
25th Percentile$73,000$6,083

What is harder CISM or CISSP? ›

They are about equal in how difficult they are. CISSP is a little more technical (not very deep, but concepts). CISM is also very management focused, but less technical. They compliment each other well, a good deal of materials are overlapping so it could be a CISSP AND CISM choice.

What is the difference between CISSP and CISM? ›

The CISM certification is solely management-focused, while CISSP is both technical and managerial and designed for security leaders who design, engineer, implement and manage the overall security posture of an organization. CISSP is more widely known than CISM, with 136,428 CISSPs globally, compared with 28,000 CISMs.

References

Top Articles
Latest Posts
Article information

Author: Melvina Ondricka

Last Updated: 16/08/2023

Views: 5281

Rating: 4.8 / 5 (68 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Melvina Ondricka

Birthday: 2000-12-23

Address: Suite 382 139 Shaniqua Locks, Paulaborough, UT 90498

Phone: +636383657021

Job: Dynamic Government Specialist

Hobby: Kite flying, Watching movies, Knitting, Model building, Reading, Wood carving, Paintball

Introduction: My name is Melvina Ondricka, I am a helpful, fancy, friendly, innocent, outstanding, courageous, thoughtful person who loves writing and wants to share my knowledge and understanding with you.