@article{1598, author = {Sabeela Pasha, Attique Shah, Muhammad Aadil}, title = {Layered Network Security Policies on OSI Model}, journal = {Journal of Information Organization}, year = {2014}, volume = {3}, number = {1}, doi = {}, url = {http://www.dline.info/jio/fulltext/v3n3/2.pdf}, abstract = {Networks are undoubtedly the effective and efficient source for communication and resource sharing that enables and facilitates both business and personal usage globally. The technologies which are associated with networks have opened the new doors to an increasing number of security threats from which the companies must protect their networks. To resolve this issue the network should be protected with well managed and well planned policies which can help to defend against the attacks and also troubleshoot the highlighted issues that are raised during the attacks. As the network is composed of the 7 OSI layers with each layer having its own sets of protocols, so if these layers are secured individually the risk of any kind of security breaches could be reduced. In this paper we have suggested policies for a network which is well managed and strongly configures the security on each OSI layer individually. This will defiantly help to secure the network and highlight the major issues of the network security and recovery plans. With the constraint that each layer has its own set of protocols that provide different functions and services so the security level must be different in each layer. In our work we have used and suggested different policies to secure the network by installing ASA routers, Firewalls, Secure blocks, SNMP applications, Password Authentications Radius servers and TACASA Server within the network and VPNS, SSH, Telnet, IP SEC tunnels for the remote access through these secure channels the data is encrypted in different techniques like MD5 (message digests 5) algorithms. In some layers of the network we have installed the IPS and IDS configured devices which secure the network as well as the data which is encrypted by these algorithms. }, }