Investigating System Operators' Perspective on Security Misconfigurations
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore a comprehensive analysis of security misconfigurations from system operators' viewpoints in this 23-minute conference talk. Delve into the root causes of common security incidents, focusing on simple misconfigurations rather than complex attacks. Examine demographic factors, Likert scale results, and managerial awareness. Investigate changes in security practices, the role of postmortems, and potential solutions. Gain valuable insights into preventing data breaches and strengthening cybersecurity measures through this Association for Computing Machinery (ACM) presentation.
Syllabus
Introduction
What are Security Misconfigurations
Demographics
Summary
Factors
Likert Scale
Do managers know what theyre doing
What changed
Postmortems
Solutions
Questions
Taught by
Association for Computing Machinery (ACM)
Related Courses
Enterprise System Management and SecurityUniversity of Colorado System via Coursera Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam PHP: Complete Login and Registration System with PHP & MYSQL
Udemy Learn Ethical Hacking From Scratch 2024
Udemy Serie Windows Server Update Services (WSUS)
Udemy