Defend from hackers using computer networking fundamentals

OSI Model

Source: http://www.tech-faq.com/wp-content/uploads/2009/01/osimodel.png

Layer 1: The Physical Layer

Layer 2: The Data Link Layer

Source: https://www.zerosuniverse.com/2018/06/what-is-mac-address.html

Layer 3: The Network Layer

Source: https://www.expressvpn.com/what-is-my-ip

Layer 4: The Transport Layer

Source: http://microchipdeveloper.com/tcpip:tcp-vs-udp

Layer 5: The Session Layer

An example of a typical handshake packet transfer[7]

Layer 6: The Presentation Layer

This characters made many iphones crash ❤

Layer 7: The Application Layer

Source: https://www.slideshare.net/saumilshah/saumilappfirewalls

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store