By l0c0 - updated: 1 month, 1 week ago - 1 message
The majority of cybersecurity incidents are caused by insider attacks; therefore, weak security implementation and lack of monitoring of the local network will drive to more significant attacks. The architecture of the Local network connection standard via two types of connection modules. 1- The Open Systems Interconnection Model(OSI) is a conceptual framework used to define how layers communicate with each other. OSI model categorizes into seven distinct layers: The physical layer, data-link layer, and network layer are the first three layers, followed by the Transport layer, Session layer, Presentation layer, and Application layer, where each layer provides functionality to the one on top. The same goes for the 2- Transmission Control Protocol/Internet Protocol(TCP-IP) suite, which was developed prior to the OSI model, which is consists of four layers: the application layer, transport layer, Internet Layer, and Link Layer, respectively In most cases, a network administrator does not concentrate on data link layer (layer 2 of OSI) security devices because it is complicated for external hackers to connect to an organization's Local Area Network(LAN) However, the data link layer of these modules and their addressing scheme is it can be easily exploitable, Mainly with physical access to the local network. When one of the layers fails, no amount of patching at higher layers would be enough to eliminate the threat effectively since this form of construction infringes traditional wisdom, which states, "Do not build on shaky foundations.". Thus, Layer 2 protection is critical in the network since data is transferred through it. The OSI model's layers operate independently of one another. Therefore exemplary security implementation of the network should cover all layers individually.