UNDERSTANDING CYBER THREATS: A DEEP DIVE INTO ATTACKS ON DIFFERENT LAYERS OF THE OSI MODEL