UNDERSTANDING ATTACKS ON DIFFERENT LAYERS OF THE OSI MODEL: A DEEP DIVE INTO CYBERSECURITY WEAK POINTS