The proliferation of networks to a large population has increased network accessibility for a large section of hackers to abuse. Stronger
security methods such as advanced encryption algorithms, efficient authentication process and ‘defense in depth’ approach are being used
to address these threats. This paper gives a brief overview of various vulnerabilities associated with each layer of the OSI Model. Issues
related to the “eighth layer” have also been elucidated. The authors proposes to carry out performance analysis of the cumulative effect of
employing security mechanisms maintained at all layers of the network