This document outlines the OSI layers, common devices used in each layer, protocols and standards associated with each layer, and examples of attack types that can target each layer. It shows that the application layer can be attacked using application proxies, firewalls and gateways targeting protocols like SMTP, POP3, IMAP, DNS and more. The physical layer is most vulnerable to denial of service attacks like jamming and tampering since it involves basic network cables, connectors, and hardware.
This document outlines the OSI layers, common devices used in each layer, protocols and standards associated with each layer, and examples of attack types that can target each layer. It shows that the application layer can be attacked using application proxies, firewalls and gateways targeting protocols like SMTP, POP3, IMAP, DNS and more. The physical layer is most vulnerable to denial of service attacks like jamming and tampering since it involves basic network cables, connectors, and hardware.
This document outlines the OSI layers, common devices used in each layer, protocols and standards associated with each layer, and examples of attack types that can target each layer. It shows that the application layer can be attacked using application proxies, firewalls and gateways targeting protocols like SMTP, POP3, IMAP, DNS and more. The physical layer is most vulnerable to denial of service attacks like jamming and tampering since it involves basic network cables, connectors, and hardware.