Introduction to Information Security Onsite Course Essay

Submitted By ida18
Words: 322
Pages: 2

Introduction to Information Security Onsite Course

As of today, millions of threats have become reality in today’s technological world. In order to prevent our network from become one of millions affected, steps to secure all seven domains have to be implemented. The OSI Model consists of these seven layers: Application, Presentation, Session, Transport, Network, Data Link, and Physical layer.
Most frequent attacks start of in the Application layer, and that’s only because it is the layer most of us are familiar with. This layer deals with the user. In order to prevent an attack on this layer security measures need to be set. For example, anti-viruses can scan systems for unwanted malicious programs from contaminating the system by scanning files and drives as well as program that could be potentially downloaded either by accident or on purpose. Policies can also be provided to employees stating that they are only allowed to do certain things on company systems. Once the employee has signed such policy, if they ever violate it, they can be reprimanded or terminated, depending on the severity of their actions.
In the Presentation Layer, data is encrypted. In order to protect this layer, a complex for of encryption should take effect. Encryption such as AES could be implemented in order to avoid data from being decrypted easily.
The Session Layer deals with communication between hosts. We can protect this layer by using encrypted VPN’s as well as secured