ATTACKS ON DIFFERENT LAYERS OF OSI MODEL: UNDERSTANDING CYBERSECURITY THREATS