What is the OSI Model?
Imagine you want to send a letter to someone on the other side of the world. You write the letter, put it in an envelope, address it, hand it to a courier who puts it on a truck, then a plane, then another truck, until it arrives at the door. Each step has a job. The OSI model works exactly like that — but for data traveling across a network.
OSI stands for Open Systems Interconnection. It is a framework that breaks network communication into 7 layers. Each layer has a specific job, and they all work together so that two devices — anywhere in the world — can communicate reliably.
The 7 Layers — Plain English
Examples: HTTP, HTTPS, SMTP, DNS, FTP.
SQL Injection: Malicious commands typed into web inputs to extract database data.
XSS: Injecting bad scripts into trusted websites.
DDoS (App Layer): Flooding a web app with fake requests until it crashes.
Examples: SSL/TLS encryption, JPEG/PNG image formats, data compression.
Weak Encryption Exploitation: Cracking outdated algorithms like MD5 to read private data.
Examples: Session tokens keeping you logged into websites.
Session Fixation: Tricking you into using an attacker-controlled session ID.
Examples: TCP for web browsing, UDP for gaming and video.
Port Scanning: Mapping open ports to find exploitable services.
Examples: IP addresses, routers, ICMP (ping).
ICMP Flood: Overwhelming a target with ping requests.
Man-in-the-Middle: Redirecting traffic through an attacker's machine.
Examples: Ethernet, Wi-Fi, MAC addresses, switches.
MAC Flooding: Overloading switch memory to broadcast all traffic to every port.
Examples: Ethernet cables, Wi-Fi signals, fiber optic cables, network interface cards.
Signal Jamming: Radio interference disrupting wireless communications.
Hardware Implants: Rogue USB or keyboard devices capturing keystrokes.
Why Defenders Need to Understand This
Every attack targets a specific layer. A firewall blocks threats at Layers 3 to 4. An IDS watches Layers 4 to 7. A WAF defends Layer 7. When you understand which layer is being attacked, you know which tool to reach for — and where to look in the logs.
The OSI model is not just theory. It is the map every attacker and defender uses to navigate the battlefield.