UNDERSTANDING THE SCOPE OF ATTACKS ON DIFFERENT LAYERS OF OSI MODEL