YoVDO

Investigating System Operators' Perspective on Security Misconfigurations

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

System Security Courses Cybersecurity Courses

Course Description

Overview

Explore a comprehensive analysis of security misconfigurations from system operators' viewpoints in this 23-minute conference talk. Delve into the root causes of common security incidents, focusing on simple misconfigurations rather than complex attacks. Examine demographic factors, Likert scale results, and managerial awareness. Investigate changes in security practices, the role of postmortems, and potential solutions. Gain valuable insights into preventing data breaches and strengthening cybersecurity measures through this Association for Computing Machinery (ACM) presentation.

Syllabus

Introduction
What are Security Misconfigurations
Demographics
Summary
Factors
Likert Scale
Do managers know what theyre doing
What changed
Postmortems
Solutions
Questions


Taught by

Association for Computing Machinery (ACM)

Related Courses

Enterprise System Management and Security
University of Colorado System via Coursera
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
PHP: Complete Login and Registration System with PHP & MYSQL
Udemy
Learn Ethical Hacking From Scratch 2024
Udemy
Serie Windows Server Update Services (WSUS)
Udemy