Skip to main content
The Agency.
Back to Cybersecurity Glossary

Resources

OSI Model

The OSI (Open Systems Interconnection) model is a conceptual framework that divides network communication functions into seven distinct layers. This standardized model enables different computer systems, applications, and network technologies to communicate effectively, regardless of their underlying architecture or manufacturer.

Developed by the International Organization for Standardization (ISO), the OSI model provides a universal language for network communication that simplifies troubleshooting, design, and security analysis by breaking complex interactions into manageable components.

The Seven Layers of the OSI Model

Layer 1 - Physical Layer: Handles raw electrical, optical, or radio signals through cables, connectors, wireless transmission media, and network interface cards. Manages voltage levels, timing, and bit synchronization. Security threats at this layer include physical tampering, cable tapping, and hardware theft.

Layer 2 - Data Link Layer: Organizes bits into frames and manages node-to-node data transfer. Adds error detection through cyclic redundancy checks (CRC) and handles MAC addressing. Security concerns include ARP spoofing, MAC flooding, and VLAN hopping attacks.

Layer 3 - Network Layer: Enables communication across different networks using IP addresses for logical addressing. Determines optimal paths for data packets through routing protocols. Security threats include IP spoofing, routing attacks, and denial-of-service floods.

Layer 4 - Transport Layer: Manages end-to-end communication, flow control, and error recovery. TCP provides reliable, connection-oriented delivery while UDP offers faster, connectionless transmission. Security concerns include session hijacking and TCP SYN flood attacks.

Layer 5 - Session Layer: Establishes, manages, and terminates communication sessions between applications. Handles synchronization and dialog control between systems. Security threats at this layer include session fixation and hijacking attacks.

Layer 6 - Presentation Layer: Handles data translation, encryption, and compression between application and network formats. Manages character encoding, data format conversion, and cryptographic operations. SSL/TLS encryption operates at this layer.

Layer 7 - Application Layer: Delivers network services directly to user applications through protocols including HTTP, FTP, SMTP, DNS, and others. Provides the interface between network capabilities and user-facing applications. Security threats include application-layer DDoS, SQL injection, and cross-site scripting attacks.

Importance for Cybersecurity

Understanding the OSI model enables organizations to build more effective network architectures and security controls. The layered approach makes it easier to troubleshoot network issues, examine security of networking protocols, and discuss network-level attacks in a structured way. Security professionals use the OSI model to understand where specific threats operate and which controls are most effective at each layer.

Is your business cyber-ready?

Talk to our team about building a security posture that keeps attackers out.

Talk to our security team