?? ♀? Potential cyberattacks and their mitigation strategies on OSI layers ??
Ashok Babu Singu
Lead - Infrastructure Services | Windows Server Administration | Active Directory | Azure | Azure AD| Exchange Online | O365 | SCCM |
?? ♀? Potential cyberattacks and their mitigation strategies on OSI layers ??
The Open System Interconnection Model, popularly known as the OSI Model, is a conceptual architecture that depicts the flow of data in a communication system. This model was developed by the International Organization for Standards (ISO) and provides the basis for the development of standards for system interconnection.
This model divides the flow of a communication system into seven layers. The layers are as follows:
? Layer 7: Application Layer: Information in a human-readable format
? Layer 6: Presentation Layer: Data formatting, encryption, Decryption
? Layer 5: Session Layer: Manages sessions for inter-host communication
? Layer 4: Transport Layer: Transfer Error-checked data between two devices
? Layer 3: Network Layer: Routes data packets using logical addressing
? Layer 2: Data Link Layer: Transmits data frames using physical addressing
? Layer 1: Physical Layer: Transmits binary signals (0, 1) over physical media
The below diagram provides a detailed overview of possible cyber-attacks across different layers of OSI and how these can be mitigated with the help of different security controls in the organization's network.
Understanding the OSI layers helps us place appropriate controls to mitigate possible cyber security threats in each layer.
?????Share it with your network. Save it for future reference.
Src: Cyber Writes