The OSI model is inefficient; each layer must take the work of higher layers, add some result, and pass the work to lower layers. This process ends with the equivalent of a gift inside seven nested boxes, each one wrapped and sealed. Surely this wrapping and unwrapping is inefficient. From reading earlier chapters of this book, cite a security advantage of the layered approach.