Anda di halaman 1dari 1

Alfredo Hernandez Project 1

Project Part 1 Multilayered Security Plan Project Part 1 As of today, millions of threats have become reality in todays technological world. In order to prevent our network from become one of millions affected, steps to secure all seven domains have to be implemented. The OSI Model consists of these seven layers: Application, Presentation, Session, Transport, Network, Data Link, and Physical layer. Most frequent attacks start of in the Application layer, and thats only because it is the layer most of us are familiar with. This layer deals with the user. In order to prevent an attack on this layer security measures need to be set. For example, anti-viruses can scan systems for unwanted malicious programs from contaminating the system by scanning files and drives as well as program that could be potentially downloaded either by accident or on purpose. Policies can also be provided to employees stating that they are only allowed to do certain things on company systems. Once the employee has signed such policy, if they ever violate it, they can be reprimanded or terminated, depending on the severity of their actions. In the Presentation Layer, data is encrypted. In order to protect this layer, a complex for of encryption should take effect. Encryption such as AES could be implemented in order to avoid data from being decrypted easily. The Session Layer deals with communication between hosts. We can protect this layer by using encrypted VPNs as well as secured connections. The Transport Layer and the Session Layer work closely together. By securing each connection, we can prevent data loss as well as bandwidth usage. If something is taking up a large amount of bandwidth, it is usually not a good sign. For the Network Layer, packets need to be encrypted. In order to keep this layer under control, firewalls should be in place with protocols preventing the use of sites that can potentially create a threat to the company. Routers should be secured as well. In order to protect the Data-link Layer, a protocol such as the Sliding Window Protocol should be in place. Last but not least, the Physical Layer has to be greatly protected because just as the Application Layer, the Physical Layer can be easily attacked. Ports will need to be closed or blocked if they are not in use. Cables need to be tested for security as well as for connectivity. Systems should be have lockout times when the user moves away from the workstation for a set amount of time. USB ports should be blocked unless otherwise specified. These are general preventions for the seven layers. Indeed there are more security measures that can go in depth depending on the level of security need for each independent user. Groups can be created depending on Need-to-Know basis, which can eventually create a more controlled environment.

Anda mungkin juga menyukai