OSI Model: Layer's, Examples & Attacks


OSI Model

The OSI model (Open Systems Interconnection) is a foundational concept that helps us understand how data flows in a network, layer by layer. Each layer has its own unique role.

Layer 1(Physical Layer)
Role: Physical connection between devices and Sends raw data (1s and Os) over cables or wireless signals.
Examples: Ethernet cables, Wi-Fi signals.
Attacks: Cable tapping.
Note: Hub Operates at Physical Layer of OSI Model.

Layer 2(Data Link Layer)
Role: Organizes data into frames and ensures error-free delivery between devices on the same network.
Examples: MAC, ARP.
Attacks: MAC spoofing, ARP poisoning.
Note: Switch operates at Data Link Layer of OSI Model.

Layer 3(Network Layer)
Role: Finds the best path for data to travel between devices on different networks.
Examples: IP (IPv4/IPv6), ICMP, BGP, OSPF.
Attacks: IP spoofing, route injection.
Note: Router Operates at network layer of OSI Model.

Layer 4(Transport Layer)
Role: Ensures data is delivered completely and correctly, either reliably (TCP) or faster without error-checking (UDP).
Examples: TCP, UDP.
Attacks: SYN flooding, session hijacking.

Layer 5(Session Layer)
Role: Manages sessions (connections) between devices.
Examples: NetBIOS, SMB.
Attacks: Session fixation, session hijacking.

Layer 6(Presentation Layer)
Role: Converts data into a readable format (e.g., encrypts, compresses and translates it).
Examples: SSL/TLS, JPEG.
Attacks: Man-in-the-middle, SSL stripping.

Layer 7(Application Layer)
Role: Provide Interfaces to end-user applications.
Examples: HTTP, FTP, DNS, SMTP.
Attacks: SQL injection, XSS, phishing.

Comments

Popular posts from this blog

Password generator using Python

Cybersecurity Project’s every beginner should do…

CyberSecurity Journey: My Path to ISC²-CC Certification