OSI (Open Systems Interconnection) is a model that provides common settings for the coordination of ISO  standard development. It consists of 7 layers, remember: “Please Do Not Throw Sausage Pizza Away”

  1. Physical: The physical layer is responsible for the transmission and reception of unstructured raw data between devices in the form of bits, such as a network interface controller, Ethernet hub, or network switch, and a physical transmission medium. e.g. cable, RJ45
  2. Data Link: The data link provides transmission of data frames between two nodes connected by a physical layer in other words physical addressing e.g. MAC, switches
  3. Network: The network layer provides structuring and managing a multi-node network, including addressing, routing, and traffic control e.g. IP, routers
  4. Transport: The transport layer provides reliable transmission of data segments between points on a network, including segmentation, acknowledgment, and multiplexing, e.g. TCP, UDP, and port numbers.
  5. Session: The session layer creates the setup, controls the connections, and ends the teardown, between two or more devices. The session layer also provides for the full-duplex, half-duplex, or simplex operation, and establishes procedures for checkpointing, suspending, restarting, and terminating a session between two related streams of data, e.g. RTCP, PTP, PAP, ACK, RPCP, SDP.
  6. Presentation: The presentation layer provides translation of data between a networking service and an application, e.g. encryption/decryption, encoding, data compression,  ASCII, PNG, MIDI, TLS.
  7. Application: The application layer is the top level in OSI. This layer provides high-level protocols for resource sharing or remote file access, e.g. Telnet, DHCP, SMTP, SNMP, NFS, HTTP, FTP, DNS.

TCP/IP model is a more concise network and consists of 4 layers, remember, “Armadillos Take In New Ants.”

  1. Network Access (or Link) corresponds to the OSI data link layer and may include some network layer protocols and similar capabilities to the physical layer.
  2. Internet performs functions as those in a subset of the OSI network layer.
  3. Transport (or host-to-host) maps to the OSI session layer and the OSI transport layer’s graceful close functionality.
  4. Application (or Process) corresponds to the OSI presentation layer, most of the session layer, and the application (or Process) layer.
OSI vs TCP/IP Model

Consideration for network and application security across OCI layers

  1. DDoS Protection: Preserves uptime despite any attack type or size. DDoS attacks are commonly on layers 3 (Network), 4 (Transport), 6 ( Presentation), and 7 (Application). Infrastructure layers attacks can occur in Network and Transportation layers. Application layer attacks can occur in the Presentation and Application layers.
  2. CDN: Use CDN to improve performance, cut hop and bandwidth costs, and cache static resources close to the edge.
  3. WAF: Web Application Firewall ( WAF) traffic control that allows legitimate traffic, protects applications by filtering and monitoring web traffics, and blocks unwanted traffic.
  4. Bot protection: identifies anomalies in bot behavior and traffic and validates them using a challenge mechanism so that it has no negative effects on users.
  5. API security: Finding vulnerable API endpoints and allowing only desired traffic
  6. Account protection: identifies and blocks attempts to hack into users’ accounts and use the information for malicious purposes.
  7. Atack analytics: analytics mitigate and respond to real cyber security threats

Reference:

https://en.wikipedia.org/wiki/OSI_model