Determine the importance of understanding the Transmission Control Protocol / Internet Protocol (TCP / IP) and Open Systems Interconnection (OSI) Reference models from the perspective of an ethical hacker. Determine the potential repercussions of a professional not understanding these models and the affect it could have on their duties.
Compare and contrast physical, internetwork, host-to-host, and application layer threats. Determine which you believe to be of the most concern to the security of networks and computer hosts. Analyze the controls designed to combat these threats and explain which layer's controls you believe to be the most adequate for that layer's threats. Justify your answer.