SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThis paper offers a new solution for administrators to reduce abuse of access controls and simplify permissions management. The end-user's abuse of access controls is a threat to network resources. The poorly configured permissions by the administrator produce a vulnerability. The countermeasure is knowledge and efficient techniques. If the concepts of 'THE SNAIL' and the best practices are followed administrators will be able to reduce the confusion of calculating the effective cumulative permissions. Using THE GRID and THE FIVE RULES allow administrators to quickly identify and reduce vulnerabilities. By understanding permissions you increase the security of file servers and your network.