Research a cyberspace model, compare it to the OSI model

You have joined a new company as a Trainee Cybersecurity Analyst. After your first 2 weeks of intense training, you are expected to ensure the security of the internal systems and critical internal data protection. Your reporting manager has asked you to research a...