🕶️
VICEINTELPRO
GitHub: HorrorClause
  • In Tenebris Videmus
  • 🚩CTFs
    • 💾Hack the Box
      • 🏫Academy
        • Command Injection Assessment
        • XSS Assessment
        • Web Attacks Assessment
    • Try Hack Me
      • In Progress
  • 📖Documents
  • 👨‍🏫HOW-TOs
    • Obisidian How-To
    • Setup Mandiant FLARE VM
  • 📑Security Fundamentals
    • Security Controls
      • Physical Security
      • Endpoint Security
      • Email Security
      • Network Security
      • AAA Controls
    • Networking 101
      • OSI Model
      • Network Fundamentals
      • Network Devices
      • Network Tools
      • Protocols and Ports
    • 👨‍💼Management Principles
      • Risk
      • Policies and Procedures
      • Compliance and Frameworks
      • Change and Patch Management
  • 🛡️Security Concepts
    • ⚠️Risk Assessment Models
      • DREAD Risk Assessment Model
      • STRIDE Threat Model
      • Common Vulnerability Scoring System (CVSS)
    • Pentesting
      • Common Terms
      • AV Identification-Evasion
      • Introduction to Payloads
      • Automating Payloads & Delivery with Metasploit
      • Shells Jack Us In, Payloads Deliver Us Shells
      • Web Shells
      • Pentesting Overview
      • Penetration Testing Process
    • 🐛Vulnerability Assessment
      • Common Vulnerabilities and Exposures (CVE)
      • Common Vulnerability Scoring System (CVSS)
      • Assessment Standards
      • Vulnerability Assessment
      • Vulnerability Scanning
      • Reporting
      • 🎯Nessus
        • Getting Started with Nessus
        • Nessus Scan
        • Working with Nessus Scan Output
        • Advanced Settings
        • Scanning Issues
      • 🦴OpenVAS (Greenbone)
        • Getting Started with OpenVAS
        • OpenVAS
        • Exporting Results
    • Passwords
      • Password Managers
      • Password Policies
      • Password Security Fundamentals
    • Frameworks
    • GRC
    • Logon Types
    • What is Dev-Null ?
  • ⚔️Offensive Security
    • OSINT
      • OSINT - Websites
      • Google Dorks
    • 🔫Attacking Common Services
      • The Concept of Attacks
      • Interacting with Common Services
      • Finding Sensitive Information
      • Attacking DNS
      • Attacking Email Services
      • Attacking FTP
      • Attacking RDP
      • Attacking SMB
      • Attacking SQL Databases
      • Cheat Sheet - Attacking Common Services
      • Service Misconfigurations
    • 🔪Attacking Web Apps with Ffuf
      • Web Fuzzing
      • Directory Fuzzing
      • Page Fuzzing
      • Recursive Fuzzing
      • DNS Records
      • Sub-domain Fuzzing
      • Vhost Fuzzing
      • Filtering Results
      • Parameter Fuzzing - GET
      • Parameter Fuzzing - POST
      • Value Fuzzing
    • ☁️Cloud
      • AWS
        • AWS S3 Buckets
    • 💉Command Injection
      • Command Injection Cheat Sheet
      • Intro to Command Injections
      • Detection
      • Injecting Commands
      • Other Injection Operators
      • Identifying Filters
      • Bypassing Space Filters
      • Bypassing Other Blacklisted Characters
      • Bypassing Blacklisted Commands
      • Advanced Command Obfuscation
      • Evasion Tools
      • Command Injection Prevention
    • Containers
      • Docker
    • ❌Cross-Site Scripting (XSS)
      • Introduction to XSS
      • Stored XSS
      • Reflected XSS
      • DOM XSS
      • XSS Discovery
      • Defacing
      • Phishing
      • Session Hijacking
      • XSS Prevention
    • Directory Busting
      • DirB
      • DirBuster
      • Ffuf
      • Gobuster
    • 🅰️DNS
      • DNSRecon
      • Fierce
    • File Inclusion
      • Local File Inclusion Cheatsheet
      • Intro to File Inclusion
      • Local File Inclusion (LFI)
      • Basic Bypass
      • PHP Filters
      • PHP Wrappers
      • Remote File Inclusion (RFI)
      • LFI and File Uploads
      • Log Poisoning
      • Automated Scanning
      • File Inclusion Prevention
    • File Transfers
      • Transferring Files
      • File Transfer - Quick Commands
      • Living off the Land
      • Windows File Transfer Methods
      • Linux File Transfer Methods
      • Catching Files over HTTP(S)
      • Transferring Files with Code
      • Miscellaneous File Transfer Methods
      • Protected File Transfers
      • Mounting Encrypted VHD Drives
      • Mounting VHD in Kali
      • File Transfer Detection
    • File Upload Attacks
      • File Upload Cheatsheet
      • Absent Validation
      • Upload Exploitation
      • Client-Side Validation
      • Blacklist Filters
      • Whitelist Filters
      • Type Filters
      • Limited File Uploads
      • Other Upload Attacks
      • Preventing File Upload Vulnerabilities
    • 👣Footprinting
      • Linux Remote Management Protocols
      • Windows Remote Management Protocols
      • Enumeration
        • Enumeration Methodology
        • 🖥️Host Based
          • Quick Commands
          • DNS
          • FTP
          • IMAP-POP3
          • IPMI
          • MSSQL
          • MySQL
          • NFS
          • Oracle TNS
          • SMB
  • Powershell
    • Powershell CheatSheet
  • Python
    • Map
    • Anonymous Functions
    • Recursion
      • ZipMap
      • Nested Sum
      • Recursion on a Tree
      • Count Nested Levels
      • Longest Word
    • Function Transformations
      • More Transformations
      • Why Transform?
    • Closures
    • Currying
    • Decorators
    • Sum Types
    • Enums
    • Match
    • Regex
  • Kusto (KQL)
    • SQL and KQL Comparison
    • Using the Where and Sort Operators
    • KQL Queries
  • HTML
  • Insecure File Uploads
Powered by GitBook
On this page
  • The Seven Layers of the OSI Model
  • 1. Physical Layer (Layer 1)
  • 2. Data Link Layer (Layer 2)
  • 3. Network Layer (Layer 3)
  • 4. Transport Layer (Layer 4)
  • 5. Session Layer (Layer 5)
  • 6. Presentation Layer (Layer 6)
  • 7. Application Layer (Layer 7)
  • The Extended OSI Model: Layers 8-10
  • 8. The User Layer (People & Human Behavior)
  • 9. The Organizational Layer (Policies & Business Decisions)
  • 10. The Government Layer (Legal & Regulatory Compliance)
  • Why Layers 8-10 Matter
  • How the OSI Model Works in Practice
  • Why the OSI Model Matters
  1. Security Fundamentals
  2. Networking 101

OSI Model

PreviousNetworking 101NextNetwork Fundamentals

Last updated 3 months ago

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to understand and standardize the functions of a networking system. It divides network communication into seven distinct layers, each with a specific role in data transmission. This layered approach helps different networking technologies and protocols work together efficiently.

The Seven Layers of the OSI Model

1. Physical Layer (Layer 1)

  • This is the lowest layer of the OSI Model, responsible for the physical connection between devices.

  • It deals with electrical signals, cables, wireless transmission, and hardware components such as network adapters and switches.

  • Example: Ethernet cables, fiber optics, radio waves (Wi-Fi, Bluetooth).

2. Data Link Layer (Layer 2)

  • Responsible for the reliable transmission of data frames between devices over a physical network.

  • This layer manages MAC (Media Access Control) addresses to uniquely identify network devices and handles error detection.

  • Divided into two sublayers:

    • MAC (Media Access Control) Sublayer – Governs how devices access the network.

    • LLC (Logical Link Control) Sublayer – Handles error checking and flow control.

  • Example: Ethernet, Wi-Fi (802.11), MAC addresses, ARP (Address Resolution Protocol).

3. Network Layer (Layer 3)

  • Handles the routing of data packets between devices across different networks.

  • Uses IP (Internet Protocol) addresses to determine the best path for data to travel.

  • Supports packet switching, routing, and congestion control.

  • Example: IP, ICMP (ping), IPv4/IPv6, routers.

4. Transport Layer (Layer 4)

  • Ensures end-to-end communication, reliability, and data flow control.

  • Uses two primary protocols:

    • TCP (Transmission Control Protocol) – Provides reliable, connection-oriented communication with error checking and retransmission.

    • UDP (User Datagram Protocol) – A connectionless, faster protocol used for real-time applications where some data loss is acceptable.

  • Example: TCP, UDP, port numbers (e.g., HTTP - port 80, HTTPS - port 443).

5. Session Layer (Layer 5)

  • Manages and maintains communication sessions between applications on different devices.

  • Handles session establishment, maintenance, and termination.

  • Example: Remote desktop sessions, SSL/TLS, NetBIOS, RPC (Remote Procedure Call).

6. Presentation Layer (Layer 6)

  • Translates data into a format that the application layer can understand.

  • Handles encryption, compression, and data format conversion.

  • Ensures compatibility between different system architectures.

  • Example: SSL/TLS encryption, JPEG, MP3, ASCII, MPEG.

7. Application Layer (Layer 7)

  • The layer closest to the user, enabling communication between applications and the network.

  • Supports network services like web browsing, email, and file transfers.

  • Uses high-level protocols that allow software applications to interact with the network.

  • Example: HTTP/HTTPS (web browsing), FTP (file transfer), SMTP (email), DNS (domain name resolution).

While the OSI Model officially has seven layers, some professionals humorously or practically extend it to include Layers 8, 9, and 10, which represent human, organizational, and governmental factors in cybersecurity and networking. These additional layers highlight the social, policy, and regulatory aspects that impact technology use and security.


The Extended OSI Model: Layers 8-10

8. The User Layer (People & Human Behavior)

  • Represents the human factor in cybersecurity and IT operations.

  • Encompasses end-user awareness, training, mistakes, social engineering, and insider threats.

  • Cyber attackers frequently target this layer through phishing, social engineering, and credential theft.

  • Security Considerations:

    • User education on phishing, strong passwords, and multi-factor authentication (MFA).

    • Social engineering awareness training.

    • Reducing human errors through automation and security policies.


9. The Organizational Layer (Policies & Business Decisions)

  • Represents corporate policies, procedures, compliance requirements, and risk management.

  • Decisions at this layer impact cybersecurity budgets, security culture, and regulatory adherence.

  • Security Considerations:

    • Implementation of security frameworks like ISO 27001, NIST Cybersecurity Framework, and CIS Controls.

    • Enforcement of security policies such as password policies, data classification, and least privilege access.

    • Incident response planning, security awareness training, and third-party risk management.


10. The Government Layer (Legal & Regulatory Compliance)

  • Represents government regulations, laws, and geopolitical factors that influence cybersecurity strategies.

  • Includes data privacy laws, national security directives, and cross-border cybersecurity cooperation.

  • Security Considerations:

    • Compliance with regulations like GDPR (General Data Protection Regulation), HIPAA (Health Insurance Portability and Accountability Act), PCI DSS (Payment Card Industry Data Security Standard), and FISMA (Federal Information Security Management Act).

    • Cyber warfare, nation-state threats, and government-imposed cybersecurity mandates.

    • International cybersecurity collaboration and cybercrime law enforcement.


Why Layers 8-10 Matter

While Layers 1-7 focus on technical networking, Layers 8-10 recognize that people, businesses, and governments play a critical role in cybersecurity. These layers remind us that security is not just about technology—it’s also about human behavior, policy enforcement, and regulatory frameworks.

By addressing Layers 8-10, organizations can strengthen their security culture, improve policy enforcement, and ensure regulatory compliance, reducing risks that purely technical solutions cannot fully mitigate.

How the OSI Model Works in Practice

When a user sends data (e.g., accessing a website), the information flows down the OSI Model from Layer 7 (Application) to Layer 1 (Physical), where it is transmitted over the network. When the data reaches the destination, it moves up the OSI Model, being processed at each layer until it reaches the receiving application.

Why the OSI Model Matters

  • Standardization: Helps ensure different networking systems and devices can communicate effectively.

  • Troubleshooting: Network engineers use it to diagnose and isolate issues at specific layers.

  • Security: Each layer presents unique vulnerabilities that cybersecurity professionals must address.

  • Interoperability: Enables vendors to develop network hardware and software that work together.

By understanding the OSI Model, IT and cybersecurity professionals can better design, secure, and troubleshoot networks, ensuring seamless communication between systems.

Top to Bottom = All People Seem To Need Data Processing (APSTNDP)

Bottom to Top = Please Do Not Throw Sausage Pizza Away (PDNTSPA)

📑