Attackers usually use stolen login credentials to go through safeguarded information or steal the info even though it is actually in transit concerning two network products. Notice which the third layer from the bottom is called Network, but network security won't implement only to this layer. Network security is https://ieeexplore.ieee.org/document/9941250