Investigating System Operators' Perspective on Security Misconfigurations.
Constanze DietrichKatharina KrombholzKevin BorgolteTobias FiebigPublished in: CCS (2018)
Keyphrases
- access control
- intrusion detection
- information security
- viewpoint
- security problems
- security requirements
- security policies
- functional requirements
- high security
- security issues
- building blocks
- computer security
- security level
- security model
- security threats
- security systems
- security analysis
- security measures
- databases
- cyber attacks
- security protocols
- electronic commerce
- network management
- statistical databases
- network security