![Enterprise Cloud Security and Governance](https://wfqqreader-1252317822.image.myqcloud.com/cover/344/36700344/b_36700344.jpg)
上QQ阅读APP看书,第一时间看更新
The TCP/IP model
It is necessary to understand the communication models because fundamentally, the network traffic is assembled, packaged, and de-assembled based on these models.
Each protocol operates at a specific layer. Depending upon the protocols being used, the security controls are needed accordingly. This is the reason why one should have a good understanding of the layers of the TCP/IP model.
Before we start working on security controls, let's understand the basic architecture of the TCP/IP model:
![](https://epubservercos.yuewen.com/F6ABA3/19470399208914606/epubprivate/OEBPS/Images/Chapter_74.jpg?sign=1739904557-SPI4YwzuKgmBT7rrr1dF3BlwWpSK2Dp1-0-e2eb046661a8839d3cd2b22171493e6d)
In order to understand how exactly layering works, we will look at an example of a Wireshark packet capture.