Secure your network with this OSI model reference. Below, you'll find links to all the tips in our "OSI -- securing the stack" series by security expert and author Michael Gregg, based on his book, Hack the Stack.
|
The mythical Layer 8: People |
|
Layer 7: The application layer |
|
Layer 6: The presentation layer |
|
Layer 5: The session layer |
|
Layer 4: The transport layer |
|
Layer 3: The network layer |
|
Layer 2: The data-link layer |
|
Layer 1: The physical layer |
![]() |
|
About the author:
Michael Gregg has been involved in IT and network security for more than 15 years. He is the
founder and CTO of Superior Solutions Inc., a risk assessment and security consulting firm. He has
developed high-level security classes and written six books; the most recent is Hack the Stack: The
Eight Layers of an Insecure Network.
About the book:
![]() |
|
Hack the Stack was written for those who seek to better understand and to gain a deeper knowledge of how TCP/IP systems really work. Such knowledge enables security professionals to make networks more secure.
Read Chapter 1, Extending
OSI to Network Security, in this PDF.
Learn more: OSI model illustrated
This was first published in May 2007
Network Management Strategies for the CIO


Join the conversationComment
Share
Comments
Results
Contribute to the conversation