OSI Model For Cyber Security

Burak Bozacı
Coding Wizards

--

The OSI model forms the basis of cyber security and also internet communication. Because “OSI Model” models device-to-device communication. To be able to attack and defend effectively, we need to have a deep understanding of the OSI model.

It is a model developed for the use of the Internet by everyone. This stack is called the osi model. Each layer separates the data in its own unique way. The parceled data is converted into a binary system and sent to the desired address via cables.

Data is processed in the same way when it reaches the destination. But the process works in reverse. Since both parties use the same stack structure, communication is provided for both parties.

It’s a stack instance which has seven layer. i.e. Client side is trying to access a website. When the client side interacts to website by clicking, client generates a GET request. This request is on the 7th layer in the beginning of the process. We can name our request as “data”. At the next stage, data goes down to 6th layer. Then 5th layer. The model acts like a stack.

But after session layer, the data is transformed as it goes down. The remaining 4 layers have their own headers. And each remaining layer adds its own headers to data.

For each posted request, the data packet travels through these layers and reaches the destination. Layer-specific header information is added to the data in each layer. As shown below.

In this manner data arrives to physical layer. Transportation is provided by cables. The name of the data changes once the header information is added to the data in the layers.

With these headers added, it will have data, source and destination information. Thus, when the data goes to the WAN, it knows where to go where it’s coming from.

When the data reaches the relevant address, this time the process works in reverse. Each layer data popped up on the local OSI Stack model is added to the target model. Stack is rebuilt. When data reaches to application layer on destination, It is in a form that can be processed in the related service. The data is processed and the response follows the same processes.

Each individual layer processes its own unique header information. With this way devices working on the layers only process data about themselves. You can observe which device works on which layer is shown below.

Because each data processed in the layer is different the attack vectors are unique to layers. We will be examining these attack vectors in the next section.

-Take care and I’ll see you next time.

--

--