Investigating System Operators' Perspective on Security Misconfigurations
Association for Computing Machinery (ACM) via YouTube
Get 20% off all career paths from fullstack to AI
Google, IBM & Meta Certificates — 40% Off for a Limited Time
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a comprehensive analysis of security misconfigurations from system operators' viewpoints in this 23-minute conference talk. Delve into the root causes of common security incidents, focusing on simple misconfigurations rather than complex attacks. Examine demographic factors, Likert scale results, and managerial awareness. Investigate changes in security practices, the role of postmortems, and potential solutions. Gain valuable insights into preventing data breaches and strengthening cybersecurity measures through this Association for Computing Machinery (ACM) presentation.
Syllabus
Introduction
What are Security Misconfigurations
Demographics
Summary
Factors
Likert Scale
Do managers know what theyre doing
What changed
Postmortems
Solutions
Questions
Taught by
Association for Computing Machinery (ACM)