Layers of the TCP/IP Model
Layers of the OSI Model
Cybersecurity Terms
Vulnerabilities
Attacks
100

This layer can utilize radio signals for transmission. 

What is the Physical Layer? 


100

This layer extracts data from the application layer to manipulate it so it can be transmitted over a network in the proper format. 

What is the Presentation Layer? 


100

A system ensures that a device can be reached. 

What is ping? 


100

These vulnerabilities allow easy access to a user account because they are not safeguarded by a strong passcode. 

What are Weak Passwords?

 

100

A compromised computer that a hacker can remotely control to attack networks. 

What is a Zombie? 

200

These layers are used to send data to a receiver and receive data.  

What are the Application, Transport, Internet/Network, and Data Link layers? 


200

This layer is responsible for forming, supporting, and removing communication sessions between devices. 

What is the Session Layer? 


200

A more secure version of HTTP that utilizes encryption.

What is HTTPS? 


200

These vulnerabilities allow hackers to access private systems because systems do not have the latest technology to deal with new malware. 

What are Outdated Systems? 


200

Any malicious software that is designed for nefarious purposes. 

What is Malware? 


300

The layer that makes sure that data is reliably transported by the use of TCP and UDP. 

What is the Transport Layer?


300

This layer can use protocols such as STP and LLDP to prevent network loops. 

What is the Data Link Layer? 


300

A translator system that allows for the translation of domain names into IP addresses.

What is DNS?

300

When software does not properly validate input from the user and improper inputs can lead to negative consequences, such as crashing. 

What is Lack of Input Validation? 


300

This attack overwhelms a network or service to disrupt the normal traffic. 

What is DDoS? 


400

This layer can have two names and is used to find the best path possible for data to reach its destination through different networks. The means to find its destination is using IP. 

What is the Internet/Network Layer?


400

The two layers that are responsible for implementing error control. 

What are the Data Link Layer and Transport Layer?


400

Hides the identity of messages by using multiple layers and multiple network nodes.

What is Onion routing? 


400

Data can be easily accessed and read due to the lack of a secret key and the scrambling to make it unreadable. 

What is the lack of Encryption? 


400

This type of attack is a hacker or scammer using false emails to steal the recipient's information. 

What are phishing attacks? 


500

The layer that corresponds to the combination of the Session, Presentation, and Application layers of the OSI. 

What is the Application Layer?


500

The layer responsible for transmitting data over connections between devices, such as cables. 

What is the Physical layer? 


500

Creates signals that establish wireless communication from place to place.


What are Radio waves? 


500

A security issue that is created mostly due to human error, which leaves vulnerabilities with the adoption of the cloud. 

What are Cloud Misconfigurations? 


500

This type of attack is a hacker or a harmful actor using someone's private information to blackmail them into satisfying their demands, such as demanding money from a company. 

What is Ransomware?