10.3 Layer 2 Security Threats

Поделиться
HTML-код
  • Опубликовано: 12 сен 2024
  • In this video i explained Layer 2 Security Threats, attacks and mitigation
    as you know OSI reference model ,it is divided into seven layers which work independently of each other. The figure shows the function of each layer and the core elements that can be exploited.
    Network administrators routinely implement security solutions to protect the elements in Layer 3 up through Layer 7. They use VPNs, firewalls, and IPS devices to protect these elements. However, if Layer 2 is compromised, then all the layers above it are also affected. For example, if a threat actor with access to the internal network captured Layer 2 frames, then all the security implemented on the layers above would be useless. The threat actor could cause a lot of damage on the Layer 2 LAN networking infrastructure
    HaiderTech Provides all latest technical and other development videos, in these videos especially includes, Kali Linux Learning tutorials, Windows Tutorials, Ethical hacking, Python Programming, C Programming, Huawei HCIA R& S, Cisco networking , CCNA, Mathematics, English grammar, IOT, Raspberry Pi tutorials, Windows servers configuration, Technology news, and motivational Speeches, English and Urdu language

Комментарии • 3