OSI VS TCP/IP in Cyber Security

What is Difference between OSI VS TCP/IP in Cyber Security

OSI VS TCP/IP in Cyber Security

Two main Parts of Networking.

OSI Model vs TCP/IP Model – What’s the Difference?

FeatureOSI ModelTCP/IP Model
Layers7 Layers4 Layers
Concept TypeTheoretical ModelPractical & Real-World
Used ForTeaching/network designReal Internet communication
Example ProtocolsFTP, HTTP, TCP, IP, etc.TCP, IP, HTTP, DNS, SMTP
  1. OSI stands for Open system interconnection: It is conceptual 7 layered models used learning and designing.
  2. TCP/IP stands for Transmission control Protocol/Internet Protocol: It is real world 4 layered model used in internet and actual data transfer.

7 Layers of OSI Model (Top to Bottom):

LayerNameSimple RoleExample
7ApplicationWhat user interacts withChrome, WhatsApp, Gmail
6PresentationTranslates/Encrypts dataJPEG, MP4, SSL/TLS encryption
5SessionStarts & ends communicationKeeps you logged into a website
4TransportSplits data into packets, error checkTCP/UDP protocols (TCP = reliable)
3NetworkChooses route for dataIP address, routers
2Data LinkMoves data between devices on same LANMAC address, switches
1PhysicalHardware sends data as signalsCables, Wi-Fi signals, Ethernet

Image for OSI VS TCP/IP in Cyber Security from note.

OSI ModelTCP/IP Model
7. Application4. Application
6. Presentation4. Application
5. Session4. Application
4. Transport3. Transport
3. Network2. Internet
2. Data Link1. Network Access
1. Physical1. Network Access

TCP/IP combines OSI layers into 4 real-world layers/ OSI VS TCP/IP in Cyber Security

6 Hacking attacks that everyone should must know!!!

  1. Phishing means Fake emails/websites/messages tracking you into giving away passwords or card infos.
  2. Malware means malicious software designed to damage your system and network. Its is viruses, worms, spyware that enter into your network and damage systems.
  3. DDoS means overload a server with a fake traffic, crashing a website for real users. Think of it like crowding a shop until no one else can get into it.
  4. Ransomware means attackers Locks your files and demands money in return to unlock it. Its like pay or loss your data.
  5. Man-in-the-middle (MITM) means Hackes secretly intercepts your online communication, data between two people like spying on a private chat.
  6. Backdoor means a secret way into system, often left by hackers to return later without getting caught.
  7. SQL Injection means attackers mess with a website’s database by inserting a malicious code. Its very commen on poorly protected sites.
    Follow for more updates!!!

That’s it fr day 7 , see yaaa!!!

For previous lectures follow Day https://munazajameel.site/day-5-part-2-of-learning-cybersecurity/

Also can check out my instagramhttps://www.instagram.com/itzmunazah/?hl=en & tiktok https://www.tiktok.com/@itzmunazah?lang=en

Related Posts

Elevate Your Brand with Stunning Websites & Engaging Content.

Support

Help Center

Report an Issue

FAQ

Contact

Live Chat

Contacts

+92346-9704576
munazajamil56@gmail.com 

© 2025 Munnaza Jameel. All Rights Reserved.