The proliferation of networks to a large population has increased network accessibility for a large section of hackers to abuse. Stronger
security methods such as advanced encryption algorithms, efficient authentication process and ‘defense in depth’ approach are being used
to address these threats. This paper gives a brief overview of various vulnerabilities associated with each layer of the OSI Model. Issues
related to the “eighth layer” have also been elucidated. The authors proposes to carry out performance analysis of the cumulative effect of
employing security mechanisms maintained at all layers of the network
Recent literature has indicated that the global trend is towards adopting a holistic approach to Network Security.
Accordingly extensive research is currently in progress to analyse and model network flows. The current paper is
anticipated to create a new benchmark in this important area of network security metrics. While the readers are familiar
with indices for (say) financial soundness of AAA CRISIL grading, there is no simplistic grading for Information
Security. This paper outlines a methodology to achieve the same, by assessing People, Process and Technology and
grading these parameters to present a simplistic grading for the Information Network