The OSI Model Simplified: Why It Matters in Cybersecurity

SAMIN BIN HUMAYUN
2 min readNov 29, 2024

--

The OSI Model and Its Importance in Cybersecurity

The OSI (Open Systems Interconnection) model is a seven-layer framework that standardizes network communication, making it easier to understand, implement, and secure.

Its importance in cybersecurity includes the following:

  • Layered Structure: Simplifies identifying vulnerabilities.
  • Enhanced Security: Allows targeted protection at each layer.
  • Incident Analysis: Helps trace and diagnose cyberattacks.
  • Interoperability: Ensures secure communication across diverse systems.

The OSI Model Layers with Mnemonic

Mnemonic: Please Do Not Throw Sausage Pizza Away

Attack Vectors of OSI Layers

  1. Physical Layer (Layer 1)
    Work: Manages hardware connections (cables, switches, hubs).
    Attacks:
  • Cable Tapping: Intercepting communication by accessing cables.
  • Signal Jamming: Disrupting wireless communication.
  • Hardware Tampering: Physical manipulation of devices.

2. Data Link Layer (Layer 2)
Work: Handles data transfer between nodes in a local network.
Attacks:

  • MAC Spoofing: Impersonating another device’s MAC address.
  • VLAN Hopping: Gaining unauthorized access across VLANs.
  • ARP Poisoning: Sending fake ARP messages to intercept traffic.

3. Network Layer (Layer 3)
Work: Manages routing and addressing (IP addresses).
Attacks:

  • IP Spoofing: Faking an IP address to hide identity or gain access.
  • DDoS: Flooding a network with traffic to overwhelm resources.
  • Routing Attacks: Manipulating routing tables or protocols (e.g., BGP hijacking).

4. Transport Layer (Layer 4)
Work: Ensures reliable data transfer through protocols like TCP/UDP.
Attacks:

  • TCP SYN Flooding: Overloading a server with incomplete connection requests.
  • UDP Flooding: Flooding a target with UDP packets.
  • Port Scanning: Identifying open ports to exploit.

5. Session Layer (Layer 5)
Work: Establishes, manages, and terminates sessions between applications.
Attacks:

  • Session Hijacking: Taking over an active session to impersonate a user.
  • Replay Attacks: Reusing intercepted data (e.g., authentication tokens).

6. Presentation Layer (Layer 6)
Work: Converts data formats and encrypts/decrypts for applications.
Attacks:

  • SSL/TLS Exploits: Exploiting vulnerabilities in encryption protocols.
  • Data Manipulation: Tampering with data during format conversion.

7. Application Layer (Layer 7)
Work: Interfaces directly with users and manages application-level protocols (HTTP, DNS).
Attacks:

  • Phishing: Tricking users into revealing sensitive information.
  • SQL Injection: Exploiting databases through manipulated queries.
  • DNS Spoofing: Redirecting users to malicious websites.

Conclusion

The OSI model’s layered approach provides a structured way to identify and defend against potential cyber threats. By understanding how attack vectors exploit each layer, cybersecurity professionals can implement targeted safeguards to secure networks comprehensively.

--

--

SAMIN BIN HUMAYUN
SAMIN BIN HUMAYUN

Written by SAMIN BIN HUMAYUN

Recent EEE graduate passionate about cybersecurity. Top 3% in Try Hack Me. I write about cyber security and technology.

No responses yet