ABOUT A indepth review of osi model, how attackers exploit these respective layers and mitigation stratergies. CREDIT All Members Of Team Crocus