This layer can utilize radio signals for transmission.
What is the Physical Layer?

This layer extracts data from the application layer to manipulate it so it can be transmitted over a network in the proper format.
What is the Presentation Layer?

A system ensures that a device can be reached.
What is ping?

These vulnerabilities allow easy access to a user account because they are not safeguarded by a strong passcode.
What are Weak Passwords?
A compromised computer that a hacker can remotely control to attack networks.
What is a Zombie? 
These layers are used to send data to a receiver and receive data.
What are the Application, Transport, Internet/Network, and Data Link layers?

This layer is responsible for forming, supporting, and removing communication sessions between devices.
What is the Session Layer?

A more secure version of HTTP that utilizes encryption.
What is HTTPS?

These vulnerabilities allow hackers to access private systems because systems do not have the latest technology to deal with new malware.
What are Outdated Systems?

Any malicious software that is designed for nefarious purposes.
What is Malware?

The layer that makes sure that data is reliably transported by the use of TCP and UDP.
What is the Transport Layer?

This layer can use protocols such as STP and LLDP to prevent network loops.
What is the Data Link Layer?

A translator system that allows for the translation of domain names into IP addresses.
What is DNS?

When software does not properly validate input from the user and improper inputs can lead to negative consequences, such as crashing.
What is Lack of Input Validation?

This attack overwhelms a network or service to disrupt the normal traffic.
What is DDoS?

This layer can have two names and is used to find the best path possible for data to reach its destination through different networks. The means to find its destination is using IP.
What is the Internet/Network Layer?

The two layers that are responsible for implementing error control.
What are the Data Link Layer and Transport Layer?

Hides the identity of messages by using multiple layers and multiple network nodes.
What is Onion routing?

Data can be easily accessed and read due to the lack of a secret key and the scrambling to make it unreadable.
What is the lack of Encryption?

This type of attack is a hacker or scammer using false emails to steal the recipient's information.
What are phishing attacks?
The layer that corresponds to the combination of the Session, Presentation, and Application layers of the OSI.
What is the Application Layer?

The layer responsible for transmitting data over connections between devices, such as cables.
What is the Physical layer?

Creates signals that establish wireless communication from place to place.
What are Radio waves?

A security issue that is created mostly due to human error, which leaves vulnerabilities with the adoption of the cloud.
What are Cloud Misconfigurations?

This type of attack is a hacker or a harmful actor using someone's private information to blackmail them into satisfying their demands, such as demanding money from a company.
What is Ransomware?
