Installing firewall or anti-virus software on enterprise workstations can help prevent some of the security problems the Internet can cause; but not everything. By understanding the different Open Systems Interconnect (OSI) levels and security threats involved with each one of them, it is easier to plan a strategy to combat security problems.
Purpose and Scope
To cover all areas I have listed the network security measures that are associated with each level of the Open Systems Interconnect (OSI).
This layer is responsible for moving raw bits from one node to another: electrical impulse, light or radio signals. This layer ...view middle of the document...
Making changes to the network topology easy using these Apcon's IntellaPatch switches.
Security being top priority in networks, tools like IntellaPatch Physical Layer switches provide access control for both small and large networks. In large environments or multi-floor building environments where wiring termination points are scattered among various buildings or floors, managing and monitoring those facilities can be a tedious and cumbersome job. This is key for environments like manufacturing where there are multiple work shifts.
Data Link layer
At this layer data packets are encoded and decoded into bits. This layer ensures that everything sent was physically received. This layer encompasses switch security topics such as ARP attacks and MAC flooding. Simple configuration changes to the network switch can help protect enterprise applications from Data layer attacks. At my workplace only authorized users can have access to layer 2 software. The IT department has full control and determines when changes are made and who is authorized to do these changes. Other measures are taken like Shutting down unused ports in the VLAN and limiting the number of allowed MAC addresses by using port security mechanism.
Network and Transport layers
These layers handle the routing or forwarding of data. These layers are where the most common security precautions take place – this layer is where routers and firewalls are implemented. Examples of threats that occur at this level are unauthorized retrieval of endpoint identity and unauthorized access to internal systems. The company utilizes Network Address Translation, Access Control lists, and firewall technologies to mitigate these risks.
This layer sets up, coordinates and terminates conversations, exchanges and dialogs between the applications at each end. This layer also sets up remote communication. At these layers the IT manager's ability to mitigate application security risks begins to diminish as developers take a bigger role in protecting applications. One way to ensure security on this layer is by testing application integrity, proper routing transaction, capability to handle messages under stress and the capability to handle...