top of page


Deeper dive into OSI Model
Let's embark on a journey through each layer of this model, exploring the devices that bring it to life, the protocols that keep it running, and the security threats that lurk in the shadows. Layer 7: Application Layer At the top of the OSI model sits the Application Layer, the realm where users directly interact with software applications. Devices: Web browsers, email clients, file transfer tools Protocols: HTTP, SMTP, FTP, DNS Security Attacks: SQL injection, cross-site scr
Nas Belfon
Oct 5, 20243 min read
Â
Â
Â
bottom of page