International Journal of Application or Innovation in Engineering & Management (IJAIEM)
The proliferation of networks to a large population has increased network accessibility for a large section of hackers to abuse. Stronger security methods such as advanced encryption algorithms, efficient authentication process and 'Defense in depth' approach are being used to address these threats. This paper gives a brief overview of various vulnerabilities associated with each layer of the OSI Model. Issues related to the \"Eighth layer\" have also been elucidated. The authors proposes to carry out performance analysis of the cumulative effect of employing security mechanisms maintained at all layers of the network.