SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThis paper intends on applying the lessons learned from the lower levels of the OSI model to the upper layers. The following figure shows the OSI model. The seven layers are also looked at as two groups of layers - Application and Data Transport layers. It is within the boundary between the application and data transport layers that we cross the philosophical split on whether your site needs to take a 'default deny' or a 'default permit' stance. End users and system administrators wholeheartedly believe that anything that hasn't clearly been prohibited should be fair game while network engineers intuitively see the need for the 'default deny' stance.