It begins with the Open Systems Interconnect (OSI) model and the TCP/IP model.  If you don’t have experience working with these tables, you’ll simply have to memorize them.  The table below contains a mnemonic to help you memorize the OSI, TCP/IP, and protocol data unit (PDU) that is mappable to each.  Start from the bottom and read upward.

PDULAYERTITLETCP/IP
d7AnymoreA
d6PhotosA
d5SnapA
s4Tot
p3Needi
f2Don’tN
b1PeopleN

Again, start by going from the bottom up to visualize it properly.  Repeat the phrase “people don’t need to snap photos anymore” (now they take “pics”) or whatever you want to put in there.  

The PDU, or protocol data unit refers to:

  • Bits
  • Frames
  • Packets
  • Segments
  • Data

But again, read these from the table going upwards.  You can memorize these by saying or writing the phrase “big feet point straight downwards”.

The TCP/IP model on the right side can be memorized by saying/writing “N2, A3,” with “IT” in the middle, or “NitA,” which could be someone’s name.  

I recommend writing these mnemonics down several times on your memorization sheet.  

The following table shows each layer, quick examples, attacks, and mitigations.  While this is not exhaustive, be sure to familiarize yourself with what each layer is and how to protect it by knowing the vulnerabilities.


LAYEREXAMPLESATTACKSMITIGATIONS
7ApplicationGUI interfaceSoftware vulnerabilitiesSandboxing, malware and vulnerability scans, review and test application code, patch management/updates.
6PresentationPresents data to the applicationUnicode vulnerabilities, code injectionSeparation of user input and program control, input validation
5SessionConnection sessionSniffing, brute force, session hijacking, information leak, spoofingPassword encryption, authentication protocols,
4TransportEstablishing the connectionInfiltration, DOSRUBAC, monitoring
3NetworkIP addressSpoofingFirewalls, routing policies, ARP broadcast monitoring
2Data LinkMAC addressMAC Spoofing, VLAN circumvention, ARP poisoningFilter MAC addresses, don’t solely rely on VLANs for security, ensure wireless applications have encryption and authentication baked in.
1PhysicalDumb devices, cabling, modemsPower interruption, disconnection, damage, theftFiber optic, use of star/mesh topology, STP