ATTACK POSSIBILITIES by OSI LAYERS