The OSI and TCP/IP models are the foundational frameworks for understanding how network communications are structured and where security controls operate. The CISSP exam does not test whether you can recite all seven OSI layer names in order — it tests whether you understand what happens at each layer, what attacks target each layer, and which controls defend at each layer. This applied understanding is the difference between passing and failing Domain 4 questions.

The OSI Model: Seven Layers of Communication

The Open Systems Interconnection (OSI) model is a conceptual framework that standardises the functions of a communication system into seven distinct layers. Each layer serves the layer above it and is served by the layer below it.

Layer 7 – Application: the layer closest to the end user. It provides the interface between the network and applications. Protocols at this layer include HTTP/HTTPS, SMTP, FTP, DNS, and LDAP. Security controls at Layer 7 include web application firewalls (WAF), application proxies, and URL filtering. Attacks at Layer 7 include SQL injection, cross-site scripting (XSS), and application-layer DDoS attacks that target specific functionality.

Layer 6 – Presentation: responsible for data translation, encryption, and compression. It ensures that data from the application layer is in a format that can be understood by the receiving application. SSL/TLS encryption is often conceptually placed at this layer (though in practice it spans layers 4-7). Encoding and format conversions (ASCII, Unicode, EBCDIC) occur here.

Layer 5 – Session: manages the establishment, maintenance, and termination of sessions between applications. Protocols include NetBIOS and RPC. Session hijacking attacks target this layer — an attacker takes over an established session by stealing the session token.

Layer 4 – Transport: provides end-to-end communication services for applications. It handles segmentation, flow control, and error correction. The two primary transport protocols are TCP (reliable, connection-oriented) and UDP (unreliable, connectionless). Security controls at Layer 4 include firewalls that filter by port (transport layer firewall), and TLS which operates at this layer for transport security. Attacks include SYN floods (consuming TCP connection state to exhaust server resources) and port scanning.