To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

From Wikipedia, the free encyclopedia

Layer 8 is a term used to refer to user or political layer on top of the 7-layer OSI model of computer networking.[1][2]

The OSI model is a 7-layer abstract model that describes an architecture of data communications for networked computers. The layers build upon each other, allowing for the abstraction of specific functions in each one. The top (7th) layer is the Application Layer describing methods and protocols of software applications. It is then held that the user is the 8th layer.

YouTube Encyclopedic

  • 1/3
    Views:
    629
    1 890
    161 230
  • Layer 8 From Logfiller
  • Layer8 Training Citrix Class Preparation
  • Each layer of the OSI model and TCP/IP explained.

Transcription

Layers, defined

According to Bruce Schneier and RSA:

  • Layer 8: The individual person.
  • Layer 9: The organization.
  • Layer 10: Government or legal compliance[3]

Network World readers[4] humorously report:

  • Layer 8: Money - Provides network corruption by inspiring increased interference from the upper layer.
  • Layer 9: Politics - Consists of technically ignorant management that negatively impacts network performance and development.

and:

  • Layer 9: Politics. "Where the most difficult problems live."
  • Layer 8: The user factor. "It turned out to be another Layer-8 problem."
  • 7 through 1: The usual OSI layers
  • Layer 0: Funding. "Because we should always start troubleshooting from the lowest layer, and nothing can exist before the funding."

Since the OSI layer numbers are commonly used to discuss networking topics, a troubleshooter may describe an issue caused by a user to be a layer 8 issue, similar to the PEBKAC acronym, the ID-Ten-T Error and also PICNIC.[5]

Political economic theory[6] holds that the 8th layer is important to understanding the OSI Model. Political policies such as network neutrality, spectrum management, and digital inclusion all shape the technologies comprising layers 1–7 of the OSI Model.

An 8th layer has also been referenced to physical (real-world) controllers containing an external hardware device which interacts with an OSI model network. An example of this is ALI in Profibus.

A network guru T-shirt from the 1980s shows Layer 8 as the "financial" layer, and Layer 9 as the "political" layer.[7] The design was credited to Evi Nemeth.

Similar pseudo-layers for TCP/IP

In the TCP/IP model, the four-layer model of the Internet, a fifth layer is sometimes analogously described as the political layer, and the sixth as the religious layer. This appears in a humorous April Fools' Day RFC, RFC 2321, published in 1998.[8]

Other uses

  • Linux Gazette carries a regular column called Layer 8 Linux Security.[9]
  • Layers 8, 9, and 10 are sometimes used to represent individuals, organizations, and governments for the user layer of service-oriented architectures. See OSI User Layers figure for details.
  • User-in-the-loop is a serious concept including Layer 8 as a system-level model.
  • In 2016, a company shipped a product called Layer8 to "bridge the universal divide between PC users and IT managers".[10]
  • Layer 8 Conference & Podcast is a professional conference focusing on social engineering and OSINT. The podcast features experts in the fields of social engineering and OSINT.

See also

References

  1. ^ Gregg, Michael (2007-05-01), "OSI: Securing the Stack, Layer 8 – Social engineering and security policy", TechTarget
  2. ^ "The Layer 8* Initiative". North Carolina State University, Information Technology Division. 2005-01-05. Archived from the original on 2013-10-29. Retrieved 2018-05-10.
  3. ^ Farquhar, Ian (2010-12-07). "Engineering Security Solutions at Layer 8 and Above". Archived from the original on 2013-05-24. Retrieved 2018-05-10.
  4. ^ Wexler, Steve Taylor and Joanie (2003-02-13). "Mailbag: OSI Layer 8 - money and politics". Network World. Retrieved 2021-11-19.
  5. ^ "Layer 8 Performance Issues". Apposite Tech. 2017-10-30. Retrieved 2018-05-10.
  6. ^ Mosco, Vincent (1996), The Political Economy of Communication: Rethinking and Renewal, SAGE Publications, Inc, ISBN 0-8039-8560-6.
  7. ^ "ISC 9-Layer OSI Model Cotton T-Shirt". ISC. 2015-01-14. Archived from the original on 2018-01-05. Retrieved 2018-05-10.
  8. ^ RFC 2321
  9. ^ Kachold, Lisa (July 2009). "Layer 8 Linux Security: OPSEC for Linux Common Users, Developers and Systems Administrators". Linux Gazette. No. 164.
  10. ^ "OctoInsight's Layer8 technology helps rebranded company surge". Prnewswire. 2016-06-09. Retrieved 2018-05-10.
This page was last edited on 23 December 2022, at 13:27
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.