DEV Community

OSI Layer-Based Security Series' Articles

Back to Narnaiezzsshaa Truong's Series
OSI Layer 4 Security Vulnerabilities & Resolutions
Cover image for OSI Layer 4 Security Vulnerabilities & Resolutions

OSI Layer 4 Security Vulnerabilities & Resolutions

Comments
9 min read
OSI Layer 4—The Steward
Cover image for OSI Layer 4—The Steward

OSI Layer 4—The Steward

Comments
4 min read
OSI Layer 5—Session Layer Security
Cover image for OSI Layer 5—Session Layer Security

OSI Layer 5—Session Layer Security

Comments
4 min read
OSI Layer 6—Presentation Layer Security
Cover image for OSI Layer 6—Presentation Layer Security

OSI Layer 6—Presentation Layer Security

Comments
4 min read
OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic
Cover image for OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

OSI Layer 7—The Orchestrator's Stage: Application Integrity as Intention, Agency, and Human-Layer Logic

Comments
4 min read
OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention
Cover image for OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention

OSI Layer 8—The Sovereign: Emotional Architecture, Organizational Mythology, and the Security of Human Intention

1
Comments
4 min read
OSI Layer 9—The Council: Governance, Power, and the Politics of Security
Cover image for OSI Layer 9—The Council: Governance, Power, and the Politics of Security

OSI Layer 9—The Council: Governance, Power, and the Politics of Security

1
Comments
4 min read
OSI Layer 10—The Cartographer: Ecosystems, Incentives, and the Economics of Security
Cover image for OSI Layer 10—The Cartographer: Ecosystems, Incentives, and the Economics of Security

OSI Layer 10—The Cartographer: Ecosystems, Incentives, and the Economics of Security

5
Comments 2
4 min read