Practical Foundations in Cybersecurity
  • 🖌️Practical Foundations in Cybersecurity
  • 1. IT career planning
    • Introduction - IT career planning
    • IT career paths – everything you need to know
    • Job roles in IT and cybersecurity
    • How to break into information security
    • The Security Operations Center (SOC) career path
    • The GRC analyst role
    • How to get CCNA certification
    • Job search strategy
  • 2. Introduction to cybersecurity
    • Introduction - Introduction to cybersecurity
    • Foundational cybersecurity concepts and practices
      • Information security definition
      • Confidentiality, integrity, and availability of information
      • Risk, threat, vulnerability
    • The cybersecurity threat landscape
    • Common cyber attacks
    • Risk mitigation methods
    • Network security risk mitigation best practices
  • 3. Cybersecurity GRC
    • Introduction - Cybersecurity GRC
    • Cybersecurity GRC
  • 4. Networking fundamentals
    • Introduction - Networking fundamentals
    • How data flow through the Internet
    • Network devices and their functions
    • The Open Systems Interconnection (OSI) model
    • Host to host communication in networking
    • How switches facilitate communication
    • How routers facilitate communication
    • Network protocols and their functions
    • OSI model layers and security threats
  • 5. Wireless security and cryptography
    • Introduction - Wireless security and cryptography
    • SSL/TLS cryptography
    • Wireless network security
    • Hashing algorithms and message integrity
    • Cryptographic encryption and confidentiality
    • The SSL/TLS handshake
    • Message signing using asymmetric keys
    • Authentication methods
    • Replay attacks and anti-replay methods
    • Generating and applying an RSA key
    • IEEE 802.11 authentication methods
    • IEEE 802.11 privacy and integrity methods
    • Authentication and encryption in WPA, WPA2, and WPA3
  • 6. Practical foundations in ethical hacking
    • Introduction - Practical foundations in ethical hacking
    • What is professional ethical hacking
    • The perils of unethical hacking
    • Defensive security vs offensive security
    • Defensive cybersecurity technologies
    • Phases of the penetration testing process
    • Types of penetration testing
    • Pentesting methodologies, frameworks, and technologies
    • Common attack targets
  • 7. Conclusion
    • Introduction - Conclusion
    • Final words
Powered by GitBook
On this page
  1. 4. Networking fundamentals

OSI model layers and security threats

This section discusses information security threats, cyber attacks, and defenses at each OSI layer

Network layers within the OSI model in the context of vulnerability and mitigation (e.g., L1 sniffing, L2 ARP spoofing MITM, L3 ICMP flooding, L4 TCP SYN flooding, L5 session hijacking, L6 phishing, and L7 DNS spoofing).

Here’s a structured comparison table categorizing the examples as attacks/threats vs. attack/threat vectors, along with their OSI layer context, vulnerabilities exploited, and mitigations:

Attack Type/Threat

Attack Technique

OSI Layer

Vulnerability Exploited

Mitigation

Sniffing

Passive interception of unencrypted traffic

L1 (Physical)

Unencrypted transmissions

Encryption (e.g., WPA3, MACsec)

ARP Spoofing (MITM)

Actively poisoning ARP tables to redirect traffic

L2 (Data Link)

Lack of ARP authentication

Dynamic ARP Inspection (DAI), VPNs

ICMP Flooding

Overwhelming a target with ping requests (DDoS)

L3 (Network)

No rate limiting on ICMP replies

ICMP rate limiting, Network filtering

TCP SYN Flooding

Exploiting TCP handshake to exhaust resources

L4 (Transport)

TCP handshake design flaw

SYN cookies, Firewall rules

Session Hijacking

Stealing valid session tokens

L5 (Session)

Weak session tokens/timeouts

HTTPS, Secure cookies, MFA

Phishing

Social engineering to steal credentials

L6 (Presentation)

Human trust, lack of training

User education, Email filtering (DMARC)

DNS Spoofing

Corrupting DNS cache to redirect users

L7 (Application)

Unvalidated DNS responses

DNSSEC, DoH/DoT (DNS over HTTPS/TLS)


Key Clarifications

  1. Attacks vs. Threat Vectors:

    • Attack: A specific malicious action (e.g., ICMP flooding).

    • Threat Vector: The method used to deliver the attack (e.g., phishing emails for credential theft).

    • Overlap: Some terms (e.g., DNS spoofing) describe both an attack and a vector.

  2. OSI Layer Context:

    • L1–L4: Primarily infrastructure attacks (e.g., DDoS, MITM).

    • L5–L7: Focused on sessions, data manipulation, and human factors.

  3. Mitigation Strategies:

    • Lower layers (L1–L4): Encryption, network hardening (e.g., firewall rules).

    • Upper layers (L5–L7): Behavioral controls (e.g., MFA, training).


How each attack type translates into a broader threat category, along with real-world implications and risk scenarios:


Threats by OSI Layer

OSI Layer

Attack Type

Threat Classification

Threat Impact & Scenario

L1 (Physical)

Sniffing

Eavesdropping Threat

Unauthorized data capture via exposed cables/Wi-Fi (e.g., stealing credentials from cleartext traffic).

Cable Tapping

Physical Intrusion Threat

Attacker physically taps fiber/copper lines to intercept data (common in espionage).

L2 (Data Link)

ARP Spoofing (MITM)

LAN Integrity Threat

Attackers redirect or monitor traffic within a local network (e.g., stealing session cookies).

MAC Flooding

Switch Saturation Threat

Overwhelms switches to force open ports, enabling sniffing (e.g., CAM table overflow attacks).

L3 (Network)

ICMP Flooding

Network Availability Threat

DDoS attacks overwhelm bandwidth/resources (e.g., Smurf attacks using amplified ICMP replies).

IP Spoofing

Source Identity Threat

Masquerading as trusted IPs to bypass ACLs or launch reflected attacks (e.g., NTP amplification).

L4 (Transport)

TCP SYN Flooding

Connection Resource Threat

Exhausts server TCP pools, causing service outages (e.g., volumetric DDoS).

UDP Flooding

Unfiltered Protocol Threat

Exploits stateless UDP to flood services (e.g., DNS/QUIC protocol abuse).

L5 (Session)

Session Hijacking

Authentication Bypass Threat

Steals active sessions to impersonate users (e.g., stealing cookies via XSS or MITM).

SSL Stripping

Downgrade Attack Threat

Forces HTTPS→HTTP to intercept plaintext data (e.g., evil-twin Wi-Fi attacks).

L6 (Presentation)

Phishing

Human Manipulation Threat

Tricks users into revealing credentials (e.g., fake login pages or malicious attachments).

Malicious File Uploads

Data Integrity Threat

Uploads malware disguised as documents (e.g., PDFs with embedded exploits).

L7 (Application)

DNS Spoofing

Trust Manipulation Threat

Redirects users to malicious sites (e.g., fake banking portals).

SQL Injection

Application Logic Threat

Bypasses authentication or exfiltrates DB data (e.g., ' OR 1=1 -- attacks).


Key Threat Characteristics

  1. L1–L4 Threats: Focus on infrastructure disruption (DDoS, MITM) and data interception.

    • Example: ICMP flooding threatens uptime (L3), while ARP spoofing threatens confidentiality (L2).

  2. L5–L7 Threats: Target sessions, users, and apps (social engineering, logic flaws).

    • Example: Phishing (L6) exploits human trust, while SQLi (L7) exploits code flaws.

  3. Shared Patterns:

    • Spoofing: ARP (L2), IP (L3), DNS (L7).

    • Flooding: ICMP (L3), TCP/UDP (L4).


Mitigation Mapping

Threat Category

Mitigation Strategies

Eavesdropping (L1/L2)

Encryption (WPA3, MACsec), physical access controls.

DDoS (L3/L4)

Rate limiting, BCP38 filtering, cloud-based scrubbing.

Session Hijacking (L5)

MFA, short-lived tokens, HSTS.

Phishing (L6)

User training, DMARC/SPF/DKIM, email filters.

App Logic (L7)

Input validation, WAFs, DNSSEC.


Real-World Threat Examples

  • L2 Threat: An attacker uses ARP spoofing in a coffee shop Wi-Fi to steal unencrypted emails.

  • L7 Threat: DNS spoofing redirects victims to a fake PayPal site, harvesting credentials.


Expanded OSI Attack Examples

OSI Layer

Common Attacks/Threats

Vulnerability

Mitigation

L1

Cable tapping, RFID cloning

Physical access to media

Physical security, encryption

L2

MAC flooding, VLAN hopping

Switch misconfigurations

Port security, VLAN segregation

L3

IP spoofing, Smurf attack

No source IP validation

Ingress filtering (BCP38)

L4

UDP flooding, Port scanning

Open ports, no rate limiting

IDS/IPS, stateful inspection

L5

SSL stripping, Man-in-the-Browser

Weak TLS implementation

HSTS, Certificate pinning

L6

Malicious file uploads (e.g., PDF)

Improper file validation

File type restrictions, sandboxing

L7

API abuse, Zero-day exploits

Logic flaws in apps

WAFs, Input validation, Patch management


Takeaways

  • NIST Alignment: L1–L4 attacks often exploit misconfigurations (e.g., ARP spoofing), while L5–L7 involve logic flaws (e.g., phishing).

  • Threat Actors: Lower-layer attacks (L1–L4) are common in network pentests; upper layers (L5–L7) target apps/users.

PreviousNetwork protocols and their functionsNextIntroduction - Wireless security and cryptography

Last updated 1 day ago