First page Back Continue Last page Image

Layer 2 Vulnerabilities

Network administrators routinely implement security solutions to protect the elements in Layer 3 up through Layer 7

However, if Layer 2 is compromised, then all the layers above it are also affected

If a threat actor with access to the internal network captured Layer 2 frames, then all the security implemented on the layers above would be useless

Recall that the OSI reference model is divided into seven layers which work independently of each other

This figure shows the function of each layer and the core elements that can be exploited