ATTACKS ON DIFFERENT LAYERS OF THE OSI MODEL – HOW HACKERS EXPLOIT WEAKNESSES