Security OSI Model
I have been working on the OSI model attached to this post. It is a combination of many notes and late nights. I continue to work on some great C|EH tech notes. I would like to add a hacker attack row/column to the OSI model. Does anyone have any layer positions for different attacks. Any information to add to the attached table would be great.