Network Security

Topics: OSI model, Data Link Layer, Access control Pages: 4 (1021 words) Published: November 19, 2005
Network Security Paper
University of Phoenix
August 9, 2005

Installing firewall or anti-virus software on enterprise workstations can help prevent some of the security problems the Internet can cause; but not everything. By understanding the different Open Systems Interconnect (OSI) levels and security threats involved with each one of them, it is easier to plan a strategy to combat security problems. Purpose and Scope

To cover all areas I have listed the network security measures that are associated with each level of the Open Systems Interconnect (OSI). Physical layer
This layer is responsible for moving raw bits from one node to another: electrical impulse, light or radio signals. This layer represents the physical application security. It includes access control, power, fire, water, and backups. Many of the threats to security at the Physical layer cause a Denial of Service (DoS) of the enterprise application, making the application unavailable to enterprise users. To ensure this does not occur, the electrical and mechanical parts of the network are not only tested periodically but are kept safe from external damages like tampering or other physical destruction. The backups are in a secured room only few people have access to this room. One method used to manage security in this layer is through Physical Layer Automation. By use of tools such as the Apcon's IntellaPatch™ line of copper and fiber Physical Layer switches, the network administrators have control and security at the foundation or physical layer of their network. With "wire once technology" built into every IntellaPatch switch, network administrators have the ability to manage and re-arrange the physical cabling topology of network closets or wire racks without the manual effort of pulling and patching a single wire. The network is cabled to IntellaPatch switches, then, using the graphical user interface (GUI) of Apcon's Control™ software, instantaneously configure and connect...

References: Data Communications retrieved on August 9, 05
Holl, K. (2003), SANS Security Essentials. OSI Defense in Depth to Increase Application Security, p2.
Client/Server Audit: One bite at a time
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Worldwide Network Security Essay
  • NTC411 Week 5 Security Solutions Essay
  • Security Domain and Strategies Essay
  • Data Security Essay
  • Aircraft Solutions: Security Assessments and Recommendations Essay
  • Security Assessment
  • Computer Network Security and Firewall Essay
  • Network Security at the Great Widget Company Essay

Become a StudyMode Member

Sign Up - It's Free