Each of these three layers presents a common security threat and uses similar security solutions. The session layer establishes, maintains, and manages sessions between applications, and security threats at this layer concern personal information and gaining root access (Holl, 2003). The next layer is the presentation layer, which ensures that data from the network can be used by the application. The presentation layer is the one most affected by malware such as viruses and worms (Panko & Panko, 2015). IT security professionals can implement intrusion detection and control to monitor and notify attacks at the presentation layer. Finally, the application layer (Layer 7) provides services to application procedures and the threats are static passwords and SNMP private community strings (Holl, 2003). The organization will need to apply encryption to limit the exposure of personal information, ensure that patches are installed for applications, that patches are run on all hardware and network devices, that they harden the operating system, and that they implement authentication methods safe (Baker & Wallace, 2007). Additionally, quality antivirus is used on workstations, servers and other devices connected to the organization's IT infrastructure. All attacker types discussed in this document are applicable. Black hat hackers and cyber terrorists will monitor exploit vulnerabilities in networks and application systems that are not properly patched as will malware authors
tags