Investigating System Operators' Perspective on Security Misconfigurations
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore a comprehensive analysis of security misconfigurations from system operators' viewpoints in this 23-minute conference talk. Delve into the root causes of common security incidents, focusing on simple misconfigurations rather than complex attacks. Examine demographic factors, Likert scale results, and managerial awareness. Investigate changes in security practices, the role of postmortems, and potential solutions. Gain valuable insights into preventing data breaches and strengthening cybersecurity measures through this Association for Computing Machinery (ACM) presentation.
Syllabus
Introduction
What are Security Misconfigurations
Demographics
Summary
Factors
Likert Scale
Do managers know what theyre doing
What changed
Postmortems
Solutions
Questions
Taught by
Association for Computing Machinery (ACM)
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network