an overview of the types of attacks in osi layer systems, with text below