Abstract
Given that dislodged working conditions are in play, system administrators
are tasked with handling security solutions that, in turn, impact most of the working
layers of the OSI model. This comprehensive approach depicts a situation in which the
originator perceives that their data is traversing through a specified encryption process
at every stage/layer, starting from the top layer (i.e., Application Layer) and gradually
proceeding down to the last one (i.e., Physical Layer). Similarly, the decryption process
takes place at every stage/layer at the destination end.