Vulnerability | OSI model

D0rilia

Active member
Member
Joined
1 yrs. 9 mth. 30 days
Messages
27
Reaction score
0
Wallet
0$
Vulnerability in each layer of the OSI model

The OSI (Open Systems Interconnection) model is like a set of rules in a game for the components of a network communication to understand each other. This model has seven layers, each with its specific job in data transmission.

Starting with the physical layer, which handles the transmission of data in the form of bits over wires or wireless signals
-> possibility of an attacker intercepting signals or physically damaging the network.

Then, at the data link layer, where data is transmitted between nearby devices
-> replay attacks, spoofing and excessive traffic.

The network layer is in charge of communication between distant devices
-> routing, denial of service and IP spoofing attacks.

At the transport layer, which ensures the delivery of data between applications
-> session hijacking, packet injection and brute force attacks.

The session layer handles the connections between applications
-> session hijacking and information leakage.

The presentation layer is responsible for translating, encrypting and compressing data.
-> cryptanalysis and data manipulation attacks.

Finally, in the application layer, which is the interface with the user
-> code injections, phishing attacks and software vulnerabilities.

It is essential to be aware of these vulnerabilities in order to protect our data and systems properly.
 
Top Bottom