The OSI Model has 7 layers, each handling a specific network function. Cyberattacks target these layers differently — knowing them helps improve security.
This layer includes cables, switches, and hardware.
Targets MAC addresses & switching.
Attacks: MAC flooding, ARP poisoning, CAM table overflow, Switch spoofing
Attacks: – IP spoofing – Route hijacking – ICMP flooding – DoS/DDoS attack
Focused on IP routing & traffic flow.
Attacks include: – SYN Flood (Layer 4) – Session hijacking (Layer 5) – SSL stripping (Layer 6) – SQL injection, XSS, CSRF (Layer 7)
(Transport → Application)
Want full explanations, diagrams, examples & real-world attack methods? Read the complete guide on DriveInTech.