STUDY OF INFORMATION SECURITY THREATS AND METHODS OF THEIR SOLUTION IN COMPUTER NETWORKS AT THE CHANNEL LEVEL
Abstract
Introduction. Information security of computer networks is the process of protecting computer networks from unauthorised access, abuse, leakage of confidential information and other threats arising from malicious actors or user negligence. Various technologies and methods are used to protect computer networks, including password protection, data encryption, network firewalls, intrusion detection systems, anti-virus software, and user authentication.
Purpose. The purpose of the article is to study the main attacks on computer networks that an attacker implements using the weak points of the second (channel) level of the OSI model and how to neutralise these attacks with the help of
Cisco network equipment software tools.
Results. The article describes in detail the essence of the channel layer of the OSI model, which is the second layer. The characteristics of this level are described and its main functions are shown. The main threats to the information security of computer networks, as well as attacks on networks implemented by an attacker using all the problems of the channel level of the OSI model, are analysed. Each of these threats and the methods of their implementation are described in detail. The article also describes in detail the main methods of protecting computer network information at the channel level of the OSI model from attacks. Detailed theoretical steps are given to implement blocking, neutralising or mitigating attacks on networks carried out by an attacker at the link layer of the OSI model. The article describes in detail ways to neutralise these attacks using Cisco network equipment software tools.
Conclusion. Computer network security is an important aspect of protecting important information and confidential data, as well as ensuring the normal operation of computer systems and networks. The level of security of computer networks varies from organisation to organisation and company to company, but it is always important to take the best possible measures to protect critical information and ensure system stability.
Downloads

This work is licensed under a Creative Commons Attribution 4.0 International License.








