ATTACKS ON DIFFERENT LAYERS OF OSI MODEL: HOW HACKERS EXPLOIT EACH LEVEL