Web application security - the fast guide 1.1 | Page 15

Chapter 1 - information Security overview P a g e | 15 1.3.1 The Physical layer: We mean by the physical layer the direct physical access to hardware. As illustrated in the chart above the access to the physical layer can be very direct and dangerous because attacker can cause direct damage or compromise network, processing, and storage devices. As example causing a denial of service that work on a server is simply doable by unplugging the power cord of that server. This is why physical security of data centers is an issue that needs to be taken seriously. A well designed architecture should allow response to attack even with physical based attacks as example sending notification or raising an alarm. 1.3.2 Network Layer: When the attacker doesn’t have any direct access to the physical hardware the only available path is through external layers toward the core where the data assets resides. Compromising network layer will make it easy for attacker to disclose, alter, or make unavailable mainly the data in motion sent by legitimate user or response sent by the server. Network layer in that model represent all activities, devices and protocols used to transfer data from its source to destination. 1.3.3 Platform layer: The platform layer represents the carrier of application layer it provides the interface between hardware devices and the application layer in addition to process and file management. This layer is normally reflected through operating system and any used framework or server software that host the application. 1.3.4 Application layer: This layer represents all input processing, storage, retrieval, manipulation and output activities done on server side or client side. This layer depends on services it gets from the platform layer. 1.3.5 Data layer: This is the layer where the precious assets reside, as it is known that the Data is the real asset in information systems. If an attacker is able to reach this layer the information system is considered as compromised. 1.3.6 The response layer: This layer is the deepest layer it encompasses all Data and system recovery, monitoring, logging and notification activities.