About cookies on this site Our websites require some cookies to function properly (required). In addition, other cookies may be used with your consent to analyze site usage, improve the user experience and for advertising. For more information, please review your options. By visiting our website, you agree to our processing of information as described in IBM’sprivacy statement. To provide a smooth navigation, your cookie preferences will be shared across the IBM web domains listed here.
Publication
SAFECONFIG 2011
Conference paper
2011 4th Symposium on Configuration Analytics and Automation, SAFECONFIG 2011: Preface
Abstract
The complexity of Network and system configuration places a heavy burden on both regular users and experienced administrators and dramatically reduces overall network assurability and usability. For example, a December 2008 report from Center for Strategic and International Studies "Securing Cyberspace for the 44th Presidency" states that "inappropriate or incorrect security configurations were responsible for 80% of Air Force vulnerabilities" and a May 2008 report from Juniper Networks "What is Behind Network Downtime?" states that "human factors [are] responsible for 50 to 80 percent of network device outages". © 2011 IEEE.