ISO and OSI model: How Does ISMS Protect OSI Model From The Cyber Threats?
Cyber threats can occur at any layer of the OSI Model, starting from the Physical Layer to the Application Layer. If you want to know about the functions of the OSI Layers, click here.
In this article, you will see the common threats which may occur in each layer of the OSI Model. You will also learn how Information Security Management systems (ISMS) or ISO/IEC 27001:2013 and ISO/IEC 27002:2022 standards provide the solution to secure OSI Layers.
Examples of Cyber Threat at OSI Layers
1. Application Layer

Solution Provides By ISMS

2. Presentation Layer

Solution Provides By ISMS

3. Session Layer

Solution Provides By ISMS

4. Transport Layer

Solution Provides By ISMS

5. Network Layer

Solution Provides By ISMS

6. Data Link Layer

Solution Provides By ISMS

7. Physical Layer

Solution Provides By ISMS
