Тёмный

Cybersecurity Architecture: Five Principles to Follow (and One to Avoid) 

IBM Technology
Подписаться 757 тыс.
Просмотров 293 тыс.
50% 1

IBM Security QRadar EDR : ibm.biz/Bdyd7k
IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/Bdyd76
This ten part video series is based on a 400 level class on Enterprise Cybersecurity Architecture taught by Jeff "the Security Guy" Crume at a local university. He'll begin by explaining the foundational principles of cybersecurity - five that are best practices and one that's just the opposite. The subsequent episodes will look at the various domains that apply to a well-designed security architecture. Be sure to subscribe so you'll get notified of the next video!
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #ibm
Chapters
00:00 Principles Introduction
01:05 Defense in Depth
04:20 Least Privilege
07:55 Separation of Duties
09:50 Secure by Design
12:15 Keep It Simple, Stupid (KISS)
14:43 Security by Obscurity

Опубликовано:

 

30 май 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 173   
@umeyrsekban4721
@umeyrsekban4721 6 месяцев назад
I completed IBM's Cybersecurity Analyst course and got my certificate, I'm here to refine my knowledge before applying a CS architect job
@jeffcrume
@jeffcrume 4 месяца назад
Excellent! Good luck to you in your learning journey!
@Dalai33
@Dalai33 7 месяцев назад
This channel is so underrated
@jeffcrume
@jeffcrume 6 месяцев назад
I’m glad you are finding value in it!
@kudakwashekucherera1889
@kudakwashekucherera1889 4 месяца назад
I like the clarity in these lectures this is the best
@kurttaguba17
@kurttaguba17 4 месяца назад
Learned a lot from them.
@manassahyoung8218
@manassahyoung8218 4 месяца назад
Highly underrated
@initialized
@initialized 4 месяца назад
10 / 10 conceptually, but I wish they would dive into some code every once in a while
@berniereid4200
@berniereid4200 10 месяцев назад
You do a great job of explaining these fundamental concepts.
@funkykong9001
@funkykong9001 Год назад
Thank you for this. Looking forward to more in the future!
@BSC2CGYM
@BSC2CGYM 4 месяца назад
I highly recommend this for anyone who is pursuing Cybersecurity at a total beginner level like myself. I’m watching these along with my IBM Cybersecurity Analyst Cert course, and it’s really helped me understand concepts that were so over my head at first. Really appreciate it!
@jeffcrume
@jeffcrume 3 месяца назад
I appreciate your watching and giving such great feedback!
@amitsethi573
@amitsethi573 6 дней назад
Thank you for such a wonderful lecture series. I learned a lot.
@sushantkumardevata5925
@sushantkumardevata5925 8 месяцев назад
Super stuff and thanks for the great presentation. Simple and concise.
@sebasmen
@sebasmen Год назад
Great video! Very clear explanation, thank you :)
@AshishGupta-xn5yj
@AshishGupta-xn5yj Год назад
Thank you won't be enough to show our gratitude for the content ❤ Looking forward to the next video in this series
@jeffcrume
@jeffcrume Год назад
Your kind comments are more than enough! Thank you!
@FuzzerHash
@FuzzerHash Год назад
IBM having many great learning videos, thanks.
@mehdisoussi9141
@mehdisoussi9141 11 месяцев назад
This is gold, thank you very much! looking forward for the rest of the series!!
@jeffcrume
@jeffcrume 11 месяцев назад
Thanks for the encouraging feedback!
@khurramwzd
@khurramwzd Год назад
Really Thank you for sharing the knowledge.
@jubrilamodu6699
@jubrilamodu6699 9 месяцев назад
Great series, learned a lot. Thank you.
@sasathishkumar5791
@sasathishkumar5791 7 месяцев назад
Excellent content and neat, simple and clearly presented
@meribipucejera
@meribipucejera 4 месяца назад
Man-in-the-middle attack! A wise man once said, learn something everyday, even if its something small. Thank you for teaching me something today...I just considered getting my certificate in cyber security and i'm starting this journey very soon!!! GREAT VIDEO
@jeffcrume
@jeffcrume 3 месяца назад
That’s great advice about learning something new every day! Glad I could help
@user-nh4mi5ed7q
@user-nh4mi5ed7q 8 месяцев назад
I learned a lot from the cybersecurity 10 videos series, I was always fascinated with security and this serie was water-satisfying... Particulary a value among many values that I learned is these fundamentals from the first video, that we should put multiple lines of defense and not rely on one defense to avoid the one single point of failure, another one is that complexity is the enemy of security, that one was very intresting to me... All the practices that you noted we should avoid and best practices that you propone are very valuable. Thank you very much!!
@jeffcrume
@jeffcrume 8 месяцев назад
You learned the lessons well!
@Keteerfio
@Keteerfio Месяц назад
Thank you Jeff, IBM for giving me this topic free.
@jeffcrume
@jeffcrume Месяц назад
You are most welcome!
@edwinrosales6322
@edwinrosales6322 7 месяцев назад
Great video, very comprehensive
@jervahnmorgan
@jervahnmorgan 11 месяцев назад
Great video.
@samsos7210
@samsos7210 2 месяца назад
Thanks for making it easy to understand the main principles of security solutions and technologies we sell to our customers.
@jeffcrume
@jeffcrume 2 месяца назад
You’re very welcome and thank you for watching!
@ishwaryanarayan1010
@ishwaryanarayan1010 2 месяца назад
Thank you :)
@aladdinaldhmary7188
@aladdinaldhmary7188 4 месяца назад
I have been searching for this for a long time. You just said what I was looking for. Thank you very much!
@jeffcrume
@jeffcrume 4 месяца назад
I love it! Glad I could help
@janno04
@janno04 Год назад
Cheers, summarised and ppted in 5 seconds.
@PinkYellowGreen2023
@PinkYellowGreen2023 8 месяцев назад
God bless you for sharing this!!
@dirkl9652
@dirkl9652 Год назад
Good stuff. Thanks
@kr_international_8608
@kr_international_8608 4 месяца назад
IBM and Google are my most favourites.
@ronaldchua2210
@ronaldchua2210 2 месяца назад
found your lecture very easy to follow and digest the concepts and ideas
@jeffcrume
@jeffcrume 2 месяца назад
I’m so glad to hear that!
@MArshadKyani
@MArshadKyani 18 дней назад
Got a motivation to learn Cybersecurity through this video... Excellent presentation.
@liquidatmosphere5528
@liquidatmosphere5528 7 месяцев назад
Thanks for thoose basics delivery. Will continue on with other Subjs of Your track in further videos. Shaking Your hand 🤝
@jeffcrume
@jeffcrume 7 месяцев назад
Thanks for the virtual handshake! 🤝
@Work_inprogress
@Work_inprogress 2 месяца назад
Thanks a lot for these lessons. They really make things quite clear fundamentally. Thanks a lot.
@jeffcrume
@jeffcrume 2 месяца назад
You are most welcome!
@mohsenjebelli155
@mohsenjebelli155 4 месяца назад
many thanks of IBM for great information sharing. this series were fantastic too.
@jeffcrume
@jeffcrume 4 месяца назад
Many thanks to you for watching!
@markfitz8315
@markfitz8315 3 месяца назад
I've watched all 10 videos - very good - lots of pointers for following up on. Thank you.
@jeffcrume
@jeffcrume 3 месяца назад
Thank you for watching!
@oscarjim3
@oscarjim3 8 месяцев назад
Totally enjoyed this primer on Cybersecurity. The explanation and use of visuals were informative.
@jeffcrume
@jeffcrume 7 месяцев назад
Thanks so much!
@babakmahmoodizadeh172
@babakmahmoodizadeh172 5 месяцев назад
Pretty clear explanations and examples. love it!
@jeffcrume
@jeffcrume 4 месяца назад
so glad to hear it!
@pdillip1
@pdillip1 Месяц назад
The best masterclass on overall security. Crystal clear concept and razor sharp analysis.. I enjoyed and learned a lot.
@billlee5679
@billlee5679 Месяц назад
can agree no more. It's so great that you've got all my words when I was just about to text the Professor some same positive comments and attributes as token of personal thanks... My immediate impression on him is naturally simple: he is really a good teacher!!!
@jeffcrume
@jeffcrume Месяц назад
I can’t tell you how much feedback like this means to me!
@seetsamolapo5600
@seetsamolapo5600 11 месяцев назад
Hey Jeff, given the high demand for cybersecurity would you be so kind to give a roadmap of how to get into cybersecurity - the certifications etc from beginner to master. I'm definitely gonna hop on this series as the videos come out.
@jeffcrume
@jeffcrume 11 месяцев назад
Hi Seetsa. Here's an attempt at that: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-4CuXNs6SboU.html
@gubs_siramsana
@gubs_siramsana 25 дней назад
Awesome explaination.
@ryancammer
@ryancammer 6 месяцев назад
Excellent!
@RC19786
@RC19786 3 месяца назад
I have to say, this has gotta be one of the best cybersec vdos out there when it comes to architecture plays, very few vendors like Cisco, Palo Alto and IBM can actually boast an end-to-end cybersec strategy and Jeff you have done a fantastic job laying it out, keep those vdos coming!
@jeffcrume
@jeffcrume 3 месяца назад
Thank you so very much for all the kind words! I really appreciate it!
@sasmeetasabat5995
@sasmeetasabat5995 2 месяца назад
simply superb
@jeffcrume
@jeffcrume 2 месяца назад
Thank you!
@geekengr
@geekengr 8 месяцев назад
Loved the video. SImple, but quite insightful. Please keep making videos on Cyber security.
@jeffcrume
@jeffcrume 8 месяцев назад
Thanks for saying so!
@valentinussofa4135
@valentinussofa4135 6 месяцев назад
Great lecture series. Thank you so much. 🙏👏👏👏
@jeffcrume
@jeffcrume 4 месяца назад
Thank you for watching!
@MichaelAlexander1967
@MichaelAlexander1967 3 месяца назад
I wore an NC State Wolfpack tee-shirt when I was around 9, 10 and 11. I turned 18 then officially wore the Hokie tee-shirts and sweatshirts 😁 😏, but I still love my Wolfpack tee 😊. Very informative and well explained video. Thanks for posting. 👍🏼👍🏼👌🏽
@jeffcrume
@jeffcrume 3 месяца назад
Go Pack!!! 😊
@captainwalker94
@captainwalker94 3 месяца назад
Wow! this is so amazing. You have simplified this information so well, especially for someone like me who is pursuing a career in cybersecurity. currently preparing for my ISC2 cc Certification.
@jeffcrume
@jeffcrume 3 месяца назад
I’m so glad you liked it! Best of luck on your certification pursuit!
@mudasirmalikawan4769
@mudasirmalikawan4769 8 месяцев назад
Sir. I must salute you in a standing position. I mean I don't have words to praise you. Just watched your first video and I subscribed. Now watch the second video. Your way of communicating cyber security is so simple and easy to understand that this is as it should be.
@jeffcrume
@jeffcrume 8 месяцев назад
You’re very kind to say so! I love making these videos and the payoff is reading comments like yours that make the effort all worthwhile!
@olubunmiboladale6293
@olubunmiboladale6293 4 месяца назад
Thank you so much for these 10-part series. I included the videos as study materials for my ISC2 Certified in Cybersecurity exam (I'm a newbie in Cybersecurity), and I'm glad to say i passed. Your explanations made the topics and concepts so easy to understand. Thank you!!!!
@jeffcrume
@jeffcrume 4 месяца назад
Wow! Congratulations on that! I’m so glad to hear that these videos helped!
@soremiolude225
@soremiolude225 2 месяца назад
Same here. I'm currently listening to it while preparing for my ISC2 exam.
@jagatkrishna1543
@jagatkrishna1543 4 месяца назад
Thanks ❤
@aruizsilva
@aruizsilva 5 месяцев назад
Great explanation, wonderful summarization, and perfect delivery. Your work here is very appreciated sir. Thank you very much.
@jeffcrume
@jeffcrume 4 месяца назад
Thanks so much for saying! And your viewing is very much appreciated as well!
@jne9479
@jne9479 4 месяца назад
Thank you for the great presentation and knowledge sharing.
@jeffcrume
@jeffcrume 4 месяца назад
Thank you for watching!
@karengomez3143
@karengomez3143 10 месяцев назад
Ty!
@user-su2rm7jt3z
@user-su2rm7jt3z 3 месяца назад
really simply explained, I'm impressed
@jeffcrume
@jeffcrume 3 месяца назад
Thank you!
@themiseducationoftheameric7407
@themiseducationoftheameric7407 3 месяца назад
Outstanding sir. Excellent video brother!
@jeffcrume
@jeffcrume 3 месяца назад
Thanks so much!
@abuwilliams7228
@abuwilliams7228 8 месяцев назад
I love ❤️❤️❤️ these Videos. Thank you so much IBM. Please keep them coming.
@jeffcrume
@jeffcrume 8 месяцев назад
@abuwilliams7228 thanks so much for watching and for the great feedback!
@unchainedwarriortv
@unchainedwarriortv 8 месяцев назад
Amazing job, Prof!
@jeffcrume
@jeffcrume 7 месяцев назад
Thanks so much @chiedozieHez!
@kareemelfetiany2042
@kareemelfetiany2042 7 месяцев назад
Thanks a lot.
@igsayi
@igsayi Год назад
Very good
@iraianbutech1350
@iraianbutech1350 2 месяца назад
Great explanation
@jeffcrume
@jeffcrume 2 месяца назад
Thanks!
@SweetyPieDiscuss
@SweetyPieDiscuss 5 месяцев назад
It's been years since I found learning enjoyable and thank you sir for creating such a great video.
@jeffcrume
@jeffcrume 4 месяца назад
Your comment made my day. Thank you!
@claudiabucknor7159
@claudiabucknor7159 7 месяцев назад
Million dollar knowledge, 🙏
@CyberSecurityGurus
@CyberSecurityGurus 25 дней назад
great infomation
@bantuandproud8456
@bantuandproud8456 5 месяцев назад
Thanks a lot, Jeff!
@jeffcrume
@jeffcrume 4 месяца назад
My pleasure!
@fouadmouzoun4724
@fouadmouzoun4724 8 месяцев назад
Thanks for sharing this nice demonstration. It is very rich in relevant information . As a beginner, it hepled me to understand good thigs.
@jeffcrume
@jeffcrume 8 месяцев назад
You’re very welcome!
@g9udaya
@g9udaya 2 месяца назад
amazing content
@jeffcrume
@jeffcrume 2 месяца назад
Thank you!
@baruchben-david4196
@baruchben-david4196 Месяц назад
I remember someone who was so confident of his security arrangement that he posted his Social Security Number on billboards. It didn't end well...
@jeffcrume
@jeffcrume Месяц назад
A predictable outcome 😂
@sachinmagdum
@sachinmagdum 4 месяца назад
Awesome content perfectly crafted! ❤ And No exams! 😂🎉
@jeffcrume
@jeffcrume 3 месяца назад
No exams for me to have to grade too! Win-win!!! 😊
@dewaynebranch776
@dewaynebranch776 Год назад
Greetings Professor, how do see security from a monolithic archicteture as different from a hybrid cloud archicteture? How does do you see DevSecOps and zero trust as necessary cybersecurity skill set for the Enterprise needs?
@balarabetahir7141
@balarabetahir7141 2 месяца назад
Thia channel is underrated
@jeffcrume
@jeffcrume Месяц назад
Thanks for saying so!
@mountp1391
@mountp1391 4 месяца назад
very good video
@jeffcrume
@jeffcrume 3 месяца назад
Thanks!
@sidneyngafei8252
@sidneyngafei8252 11 месяцев назад
What about zero trust? Could that be one of the principles?
@marnick322
@marnick322 10 месяцев назад
thanks
@arifulislamleeton
@arifulislamleeton 9 месяцев назад
Welcome
@galaxycleaningegypt
@galaxycleaningegypt 11 месяцев назад
Would you organize the playlist of " Cybersecurity " for easy access
@juergenm6107
@juergenm6107 4 месяца назад
Hi, nice vid. IMHO one principle was missing. "Secure by default"
@jeffcrume
@jeffcrume 4 месяца назад
Great point!
@tyrojames9937
@tyrojames9937 Год назад
COOL👍🏾😎
@HeatherFaraMS
@HeatherFaraMS 10 месяцев назад
How would you modify for a modern “data open by default” stance, where you want to encourage filesharing and collaboration across disciplines (only lock read on data and files internally with privacy rule)? How does read all line up with least privilege?
@jeffcrume
@jeffcrume 10 месяцев назад
It all depends upon the value and sensitivity of the data. For some, just ensuring that it isn’t tampered with by making it read only is fine but for others we may need much tighter controls. More on this in the Data Security video later in the series…
@user-zu2mi7je9d
@user-zu2mi7je9d 6 месяцев назад
Thanks for this video. How do you ensure that the public key is unique to the user ? If i change my computer, how retain my private key ? How do you ensure ia cannot find the private key associated with public one, if mathematically associated ?
@jeffcrume
@jeffcrume 4 месяца назад
There are a number of ways to handle this depending on the level of security you need. The easiest is to use an encrypted cloud sync service. Another is to have the keys stored in removable hardware that is tamper resistant. In some cases, you may just decide to have different keys for different devices. All depends on the needs of the particular use case
@SteveM-io4yn
@SteveM-io4yn 2 месяца назад
Great information! Thank you. Is there a transcript that can be downloaded?
@jeffcrume
@jeffcrume 2 месяца назад
Yes, click into the description and scroll down and you will find a link to the transcript. This should be the case for all the videos we do on the channel
@ABDUL_Hameed_00
@ABDUL_Hameed_00 11 месяцев назад
Hi how can I start my career in cyber security Can anyone please suggest how should I start
@user-gd4wt6oi7y
@user-gd4wt6oi7y 20 дней назад
As I pointed out the ultimate security in all levels are in the language of security firewalls from one point till end
@margota8342
@margota8342 Год назад
Do you need to know a programming language to use cyber security fully?
@jeffcrume
@jeffcrume Год назад
No. There are plenty of jobs in cybersecurity that don’t involve coding.
@samraalmas
@samraalmas 8 месяцев назад
hi i am a CS graduate but have a very little about cybersecurity. I want to start the career but it seems like it's a very vast field with multiple paths. Can anyone please guide me where to start. I am also planning to apply for erasmus mundus scholarship for master program in cybersecurity. What should I have to ace this scholarship?
@jmlfa
@jmlfa 2 месяца назад
I am a lot more worried about AI "response" poisoning than I am about data poisoning ... Remember Schumer, Schiff and the Department of Truth?
@amitchandak1526
@amitchandak1526 3 месяца назад
Can someone help me with the tool he's using for creating this video, how is he marking and doing it in front ?
@jeffcrume
@jeffcrume 3 месяца назад
Sure, search the channel for “how we make them” and you’ll see me in a video explaining
@Dr.CherylCooper
@Dr.CherylCooper 6 дней назад
Can I get a copy of the PowerPoint slides please.
@God1293
@God1293 Год назад
❤❤❤
@s11-informationatyourservi44
@s11-informationatyourservi44 11 месяцев назад
@user-gd4wt6oi7y
@user-gd4wt6oi7y 20 дней назад
How they reached there with the encryption key is software developed which then clears the encryption into legit reading😊
@dillip4572
@dillip4572 4 месяца назад
Goodjob sir. Can we use https instead of http :)
@jeffcrume
@jeffcrume 4 месяца назад
Please do!
@user-ym3rc7xy2d
@user-ym3rc7xy2d 4 месяца назад
Can verification by other my device be an example duty sep????i mean credit cards verification
@jeffcrume
@jeffcrume 3 месяца назад
Typically we think of SOD as involving multiple people whereas what I think you are describing is more like multi-factor authentication, if I’m understanding your comment
@user-gd4wt6oi7y
@user-gd4wt6oi7y 20 дней назад
I cannot say how good excited I am feeling knowing now what I know to create something wonderful simple for everyday consumers
@bobanmilisavljevic7857
@bobanmilisavljevic7857 9 месяцев назад
🥳👍
@maZumaZungu
@maZumaZungu 10 месяцев назад
🙏🙏🙏🙏🙏❤
@mikechickenman
@mikechickenman 3 месяца назад
Showing off those lefty superpowers.
@jeffcrume
@jeffcrume 3 месяца назад
Ha! If only, I could. Search in the channel for the video I did on “how we make them” and you’ll find out I’m actually not a lefty … 😊
@a4ldev933
@a4ldev933 7 месяцев назад
@4;10 you said,, the user is also responsible for security. I beg the difference. The user is NOT responsible for security. It is the job of the designer and implementor. For example: I'm a user who can access to my bank account via a bank portal. No one holds me responsible for security of the website.
@jeffcrume
@jeffcrume 7 месяцев назад
I understand you point but would say that you as a user still bear some of the responsibility such as to pick a good password and not share it. Security is the responsibility of everyone to various degrees
@MikeHunt2565
@MikeHunt2565 7 месяцев назад
Yeah dont be stupid and make simple passwords or leave all your SPII or PII accessible lol
@rickyswan8216
@rickyswan8216 6 месяцев назад
The user is totally responsible for security, In a workplace environment staff must understand their responsibilities to ensure data is protected using a cyber hygiene approach. Since the human is the weakest link in the chain, the end user can be vulnerable therefore annual training should be in place for staff to understand the importance of security and what to be aware of and how they can help defend. Everyone has a part to play to defend.
@Dalai33
@Dalai33 6 месяцев назад
This is the type of mindset that would get the whole org in trouble.
@YourDailyR
@YourDailyR 6 месяцев назад
Are you drunk? Your bank will never pay you if they hijack your login. Don’t lock your door, the government is responsible for your security. 😂
@Illiakubasov
@Illiakubasov 7 дней назад
i love agry dog)
@nicholastoo858
@nicholastoo858 2 месяца назад
Tell IBM to start making laptops.
@wolfhunter4jesus118
@wolfhunter4jesus118 7 месяцев назад
Why can't my text book explain it like this!
@jeffcrume
@jeffcrume 7 месяцев назад
I had the same reaction back in the days when I was a student. Now that I’m teaching, I’m trying to take a different approach
@arifulislamleeton
@arifulislamleeton 9 месяцев назад
Hi I'm Ariful Islam leeton im software developer and Students connect cyber security
@ryannel374
@ryannel374 День назад
This is almost 1 year old , still relevant ?
@user-gd4wt6oi7y
@user-gd4wt6oi7y 20 дней назад
Yet everything is being attacked it means enemies within and some crazed fixated lowlife obsessors on individuals creating havoc control decimation of their lives. Therefore ultimately security in consumers hands I figured this long time back as bastard obsessor kept moving with me wherever i went, neither the bastard as such has hole to face me or has any interest except block my life and with abuse horrific ones that too
@jann9507
@jann9507 3 месяца назад
The video was a mish mash of best practices, tools, process, some architecture and people responsibility Disappointing
Далее
Cybersecurity Architecture: Networks
27:31
Просмотров 90 тыс.
ИМПРОВИЗАТОРЫ | Нам 8 лет
1:57:59
Просмотров 342 тыс.
МЯСНОЙ ЦЕХ - Страшилки Minecraft
37:24
The AI Cybersecurity future is here
26:42
Просмотров 147 тыс.
Cyber Attack Trends: Global Identity Crisis
15:02
Просмотров 35 тыс.
Cybersecurity Quiz. How Much Do You Know?
10:57
Просмотров 10 тыс.
Cybersecurity Architecture: Roles and Tools
14:07
Просмотров 84 тыс.