Wireless networks are inherently vulnerable to various forms of interference and malicious jamming due to their open and broadcast nature, which can severely impact connectivity, degrade service quality, and even lead to complete denial of service in critical applications. A comprehensive analysis of radio frequency jamming methodologies is therefore required to identify threats to wireless networks with the understanding of jamming tactics and their impact on connectivity, especially in scenarios with high demand for constant traffic. This research conducts an extensive literature review to categorize and elucidate the various jamming techniques and types of jammers. Unlike previous works that have focused on attack strategies specific to certain protocols, this article offers a broad survey, creating a taxonomy of jamming techniques, strategies and jammers employing these to the Physical (PHY) layer. The study aims to remove misconceptions and enhance comprehension of PHY layer jamming mechanisms by clarifying the often-confused terminologies and establishing cross-domain relationships among different strategies. The classification of jammers and jamming techniques is designed to cover all wireless protocols, modulation schemes, and access methods, thereby identifying vulnerabilities across the spectrum of wireless communications. This foundational work paves way for researchers and engineers to develop effective detection, identification, and mitigation strategies, ultimately bolstering the defense capabilities of wireless communication systems in both civil and military applications. Through this exploration, the article sets a new baseline for understanding the complexities of Radio Frequency (RF) jamming and lays the groundwork for future advancements in anti-jamming solutions.