Ensuring the protection of information systems digital links based on functional resources physical and link layers

The information security system in modern communication networks assumes the presence of end-to-end control of work at the levels from the physical (L1) to the application process (L7). The article shows the possibilities of significantly simplifying hacking with subsequent access to service and user information of the network, if the work on the physical and channel (L2) levels is not fully controlled by the network administrator. Moreover, even encryption methods used at the network (L3) and higher levels do not protect against such hacking. By means of uncontrolled influences, conditions are created for the consistent hacking of protection from level to level up, like the "opening of a matryoshka doll".
On the other hand, the hacking party's lack of access to the L1 and L2 levels makes, with certain efforts, the process of unauthorized access to information of the upper levels of modern networks extremely difficult, even in cases where there is no encryption on them. In the second part of article, these anti-hacking capabilities are considered using the example of a generalized proprietary broadband access system.

Download in .pdf

Request call
Send

I agree to the privacy policy that I have read

* Necessarily

Your message has been sent successfully