Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

Поделиться
HTML-код
  • Опубликовано: 28 май 2024
  • IBM Security QRadar EDR : ibm.biz/Bdyd7k
    IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/Bdyd76
    This ten part video series is based on a 400 level class on Enterprise Cybersecurity Architecture taught by Jeff "the Security Guy" Crume at a local university. He'll begin by explaining the foundational principles of cybersecurity - five that are best practices and one that's just the opposite. The subsequent episodes will look at the various domains that apply to a well-designed security architecture. Be sure to subscribe so you'll get notified of the next video!
    Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
    Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
    #AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #ibm
    Chapters
    00:00 Principles Introduction
    01:05 Defense in Depth
    04:20 Least Privilege
    07:55 Separation of Duties
    09:50 Secure by Design
    12:15 Keep It Simple, Stupid (KISS)
    14:43 Security by Obscurity

Комментарии • 172

  • @umeyrsekban4721
    @umeyrsekban4721 6 месяцев назад +15

    I completed IBM's Cybersecurity Analyst course and got my certificate, I'm here to refine my knowledge before applying a CS architect job

    • @jeffcrume
      @jeffcrume 4 месяца назад

      Excellent! Good luck to you in your learning journey!

  • @Dalai33
    @Dalai33 6 месяцев назад +59

    This channel is so underrated

    • @jeffcrume
      @jeffcrume 6 месяцев назад +5

      I’m glad you are finding value in it!

    • @kudakwashekucherera1889
      @kudakwashekucherera1889 4 месяца назад +1

      I like the clarity in these lectures this is the best

    • @kurttaguba17
      @kurttaguba17 4 месяца назад

      Learned a lot from them.

    • @manassahyoung8218
      @manassahyoung8218 4 месяца назад

      Highly underrated

    • @initialized
      @initialized 3 месяца назад

      10 / 10 conceptually, but I wish they would dive into some code every once in a while

  • @BSC2CGYM
    @BSC2CGYM 4 месяца назад +11

    I highly recommend this for anyone who is pursuing Cybersecurity at a total beginner level like myself. I’m watching these along with my IBM Cybersecurity Analyst Cert course, and it’s really helped me understand concepts that were so over my head at first. Really appreciate it!

    • @jeffcrume
      @jeffcrume 3 месяца назад +2

      I appreciate your watching and giving such great feedback!

  • @berniereid4200
    @berniereid4200 10 месяцев назад +24

    You do a great job of explaining these fundamental concepts.

  • @meribipucejera
    @meribipucejera 4 месяца назад +2

    Man-in-the-middle attack! A wise man once said, learn something everyday, even if its something small. Thank you for teaching me something today...I just considered getting my certificate in cyber security and i'm starting this journey very soon!!! GREAT VIDEO

    • @jeffcrume
      @jeffcrume 3 месяца назад

      That’s great advice about learning something new every day! Glad I could help

  • @funkykong9001
    @funkykong9001 Год назад +5

    Thank you for this. Looking forward to more in the future!

  • @Keteerfio
    @Keteerfio Месяц назад +1

    Thank you Jeff, IBM for giving me this topic free.

    • @jeffcrume
      @jeffcrume Месяц назад

      You are most welcome!

  • @samsos7210
    @samsos7210 2 месяца назад +1

    Thanks for making it easy to understand the main principles of security solutions and technologies we sell to our customers.

    • @jeffcrume
      @jeffcrume Месяц назад

      You’re very welcome and thank you for watching!

  • @amitsethi573
    @amitsethi573 3 дня назад

    Thank you for such a wonderful lecture series. I learned a lot.

  • @pdillip1
    @pdillip1 Месяц назад +5

    The best masterclass on overall security. Crystal clear concept and razor sharp analysis.. I enjoyed and learned a lot.

    • @billlee5679
      @billlee5679 Месяц назад +1

      can agree no more. It's so great that you've got all my words when I was just about to text the Professor some same positive comments and attributes as token of personal thanks... My immediate impression on him is naturally simple: he is really a good teacher!!!

    • @jeffcrume
      @jeffcrume Месяц назад +1

      I can’t tell you how much feedback like this means to me!

  • @sebasmen
    @sebasmen Год назад +3

    Great video! Very clear explanation, thank you :)

  • @user-nh4mi5ed7q
    @user-nh4mi5ed7q 8 месяцев назад +6

    I learned a lot from the cybersecurity 10 videos series, I was always fascinated with security and this serie was water-satisfying... Particulary a value among many values that I learned is these fundamentals from the first video, that we should put multiple lines of defense and not rely on one defense to avoid the one single point of failure, another one is that complexity is the enemy of security, that one was very intresting to me... All the practices that you noted we should avoid and best practices that you propone are very valuable. Thank you very much!!

    • @jeffcrume
      @jeffcrume 8 месяцев назад +2

      You learned the lessons well!

  • @olubunmiboladale6293
    @olubunmiboladale6293 4 месяца назад +2

    Thank you so much for these 10-part series. I included the videos as study materials for my ISC2 Certified in Cybersecurity exam (I'm a newbie in Cybersecurity), and I'm glad to say i passed. Your explanations made the topics and concepts so easy to understand. Thank you!!!!

    • @jeffcrume
      @jeffcrume 4 месяца назад

      Wow! Congratulations on that! I’m so glad to hear that these videos helped!

    • @soremiolude225
      @soremiolude225 2 месяца назад

      Same here. I'm currently listening to it while preparing for my ISC2 exam.

  • @sushantkumardevata5925
    @sushantkumardevata5925 8 месяцев назад +1

    Super stuff and thanks for the great presentation. Simple and concise.

  • @FuzzerHash
    @FuzzerHash Год назад +11

    IBM having many great learning videos, thanks.

  • @Work_inprogress
    @Work_inprogress 2 месяца назад +1

    Thanks a lot for these lessons. They really make things quite clear fundamentally. Thanks a lot.

    • @jeffcrume
      @jeffcrume Месяц назад

      You are most welcome!

  • @khurramwzd
    @khurramwzd Год назад +2

    Really Thank you for sharing the knowledge.

  • @seetsamolapo5600
    @seetsamolapo5600 11 месяцев назад +6

    Hey Jeff, given the high demand for cybersecurity would you be so kind to give a roadmap of how to get into cybersecurity - the certifications etc from beginner to master. I'm definitely gonna hop on this series as the videos come out.

    • @jeffcrume
      @jeffcrume 11 месяцев назад +3

      Hi Seetsa. Here's an attempt at that: ruclips.net/video/4CuXNs6SboU/видео.html

  • @kr_international_8608
    @kr_international_8608 4 месяца назад +1

    IBM and Google are my most favourites.

  • @ishwaryanarayan1010
    @ishwaryanarayan1010 Месяц назад +2

    Thank you :)

  • @RC19786
    @RC19786 3 месяца назад +1

    I have to say, this has gotta be one of the best cybersec vdos out there when it comes to architecture plays, very few vendors like Cisco, Palo Alto and IBM can actually boast an end-to-end cybersec strategy and Jeff you have done a fantastic job laying it out, keep those vdos coming!

    • @jeffcrume
      @jeffcrume 3 месяца назад

      Thank you so very much for all the kind words! I really appreciate it!

  • @mehdisoussi9141
    @mehdisoussi9141 11 месяцев назад +6

    This is gold, thank you very much! looking forward for the rest of the series!!

    • @jeffcrume
      @jeffcrume 11 месяцев назад

      Thanks for the encouraging feedback!

  • @ronaldchua2210
    @ronaldchua2210 2 месяца назад +1

    found your lecture very easy to follow and digest the concepts and ideas

    • @jeffcrume
      @jeffcrume Месяц назад

      I’m so glad to hear that!

  • @sasmeetasabat5995
    @sasmeetasabat5995 2 месяца назад +1

    simply superb

  • @MichaelAlexander1967
    @MichaelAlexander1967 3 месяца назад +1

    I wore an NC State Wolfpack tee-shirt when I was around 9, 10 and 11. I turned 18 then officially wore the Hokie tee-shirts and sweatshirts 😁 😏, but I still love my Wolfpack tee 😊. Very informative and well explained video. Thanks for posting. 👍🏼👍🏼👌🏽

    • @jeffcrume
      @jeffcrume 3 месяца назад

      Go Pack!!! 😊

  • @AshishGupta-xn5yj
    @AshishGupta-xn5yj Год назад +10

    Thank you won't be enough to show our gratitude for the content ❤
    Looking forward to the next video in this series

    • @jeffcrume
      @jeffcrume Год назад +1

      Your kind comments are more than enough! Thank you!

  • @janno04
    @janno04 Год назад +2

    Cheers, summarised and ppted in 5 seconds.

  • @sasathishkumar5791
    @sasathishkumar5791 7 месяцев назад +1

    Excellent content and neat, simple and clearly presented

  • @PinkYellowGreen2023
    @PinkYellowGreen2023 8 месяцев назад +1

    God bless you for sharing this!!

  • @baruchben-david4196
    @baruchben-david4196 Месяц назад +1

    I remember someone who was so confident of his security arrangement that he posted his Social Security Number on billboards. It didn't end well...

    • @jeffcrume
      @jeffcrume Месяц назад

      A predictable outcome 😂

  • @edwinrosales6322
    @edwinrosales6322 7 месяцев назад +1

    Great video, very comprehensive

  • @claudiabucknor7159
    @claudiabucknor7159 7 месяцев назад +2

    Million dollar knowledge, 🙏

  • @jubrilamodu6699
    @jubrilamodu6699 9 месяцев назад +3

    Great series, learned a lot. Thank you.

  • @MArshadKyani
    @MArshadKyani 15 дней назад

    Got a motivation to learn Cybersecurity through this video... Excellent presentation.

  • @markfitz8315
    @markfitz8315 3 месяца назад +1

    I've watched all 10 videos - very good - lots of pointers for following up on. Thank you.

    • @jeffcrume
      @jeffcrume 3 месяца назад

      Thank you for watching!

  • @aladdinaldhmary7188
    @aladdinaldhmary7188 4 месяца назад +1

    I have been searching for this for a long time. You just said what I was looking for. Thank you very much!

    • @jeffcrume
      @jeffcrume 4 месяца назад

      I love it! Glad I could help

  • @user-su2rm7jt3z
    @user-su2rm7jt3z 3 месяца назад +1

    really simply explained, I'm impressed

  • @liquidatmosphere5528
    @liquidatmosphere5528 7 месяцев назад +1

    Thanks for thoose basics delivery. Will continue on with other Subjs of Your track in further videos. Shaking Your hand 🤝

    • @jeffcrume
      @jeffcrume 7 месяцев назад +1

      Thanks for the virtual handshake! 🤝

  • @iraianbutech1350
    @iraianbutech1350 2 месяца назад +1

    Great explanation

  • @captainwalker94
    @captainwalker94 3 месяца назад +1

    Wow! this is so amazing. You have simplified this information so well, especially for someone like me who is pursuing a career in cybersecurity. currently preparing for my ISC2 cc Certification.

    • @jeffcrume
      @jeffcrume 3 месяца назад

      I’m so glad you liked it! Best of luck on your certification pursuit!

  • @jagatkrishna1543
    @jagatkrishna1543 4 месяца назад +2

    Thanks ❤

  • @gubs_siramsana
    @gubs_siramsana 23 дня назад

    Awesome explaination.

  • @themiseducationoftheameric7407
    @themiseducationoftheameric7407 3 месяца назад +1

    Outstanding sir. Excellent video brother!

    • @jeffcrume
      @jeffcrume 3 месяца назад

      Thanks so much!

  • @babakmahmoodizadeh172
    @babakmahmoodizadeh172 5 месяцев назад +1

    Pretty clear explanations and examples. love it!

    • @jeffcrume
      @jeffcrume 4 месяца назад

      so glad to hear it!

  • @oscarjim3
    @oscarjim3 8 месяцев назад +1

    Totally enjoyed this primer on Cybersecurity. The explanation and use of visuals were informative.

    • @jeffcrume
      @jeffcrume 7 месяцев назад

      Thanks so much!

  • @dirkl9652
    @dirkl9652 Год назад +2

    Good stuff. Thanks

  • @mohsenjebelli155
    @mohsenjebelli155 4 месяца назад +1

    many thanks of IBM for great information sharing. this series were fantastic too.

    • @jeffcrume
      @jeffcrume 4 месяца назад

      Many thanks to you for watching!

  • @valentinussofa4135
    @valentinussofa4135 6 месяцев назад +1

    Great lecture series. Thank you so much. 🙏👏👏👏

    • @jeffcrume
      @jeffcrume 4 месяца назад +1

      Thank you for watching!

  • @kareemelfetiany2042
    @kareemelfetiany2042 7 месяцев назад +2

    Thanks a lot.

  • @bantuandproud8456
    @bantuandproud8456 5 месяцев назад +1

    Thanks a lot, Jeff!

    • @jeffcrume
      @jeffcrume 4 месяца назад

      My pleasure!

  • @jervahnmorgan
    @jervahnmorgan 11 месяцев назад +2

    Great video.

  • @geekengr
    @geekengr 8 месяцев назад +2

    Loved the video. SImple, but quite insightful. Please keep making videos on Cyber security.

    • @jeffcrume
      @jeffcrume 8 месяцев назад

      Thanks for saying so!

  • @ryancammer
    @ryancammer 6 месяцев назад +1

    Excellent!

  • @jne9479
    @jne9479 4 месяца назад +1

    Thank you for the great presentation and knowledge sharing.

    • @jeffcrume
      @jeffcrume 4 месяца назад +1

      Thank you for watching!

  • @CyberSecurityGurus
    @CyberSecurityGurus 22 дня назад

    great infomation

  • @abuwilliams7228
    @abuwilliams7228 8 месяцев назад +1

    I love ❤️❤️❤️ these Videos. Thank you so much IBM. Please keep them coming.

    • @jeffcrume
      @jeffcrume 8 месяцев назад

      @abuwilliams7228 thanks so much for watching and for the great feedback!

  • @aruizsilva
    @aruizsilva 5 месяцев назад +1

    Great explanation, wonderful summarization, and perfect delivery. Your work here is very appreciated sir. Thank you very much.

    • @jeffcrume
      @jeffcrume 4 месяца назад

      Thanks so much for saying! And your viewing is very much appreciated as well!

  • @mudasirmalikawan4769
    @mudasirmalikawan4769 8 месяцев назад +2

    Sir. I must salute you in a standing position. I mean I don't have words to praise you. Just watched your first video and I subscribed. Now watch the second video. Your way of communicating cyber security is so simple and easy to understand that this is as it should be.

    • @jeffcrume
      @jeffcrume 8 месяцев назад +2

      You’re very kind to say so! I love making these videos and the payoff is reading comments like yours that make the effort all worthwhile!

  • @unchainedwarriortv
    @unchainedwarriortv 8 месяцев назад +1

    Amazing job, Prof!

    • @jeffcrume
      @jeffcrume 7 месяцев назад

      Thanks so much @chiedozieHez!

  • @sachinmagdum
    @sachinmagdum 3 месяца назад +1

    Awesome content perfectly crafted! ❤ And No exams! 😂🎉

    • @jeffcrume
      @jeffcrume 3 месяца назад +1

      No exams for me to have to grade too! Win-win!!! 😊

  • @karengomez3143
    @karengomez3143 10 месяцев назад +2

    Ty!

  • @SweetyPieDiscuss
    @SweetyPieDiscuss 5 месяцев назад +1

    It's been years since I found learning enjoyable and thank you sir for creating such a great video.

    • @jeffcrume
      @jeffcrume 4 месяца назад +1

      Your comment made my day. Thank you!

  • @igsayi
    @igsayi Год назад +2

    Very good

  • @fouadmouzoun4724
    @fouadmouzoun4724 8 месяцев назад +1

    Thanks for sharing this nice demonstration. It is very rich in relevant information . As a beginner, it hepled me to understand good thigs.

    • @jeffcrume
      @jeffcrume 8 месяцев назад

      You’re very welcome!

  • @g9udaya
    @g9udaya 2 месяца назад +1

    amazing content

  • @juergenm6107
    @juergenm6107 4 месяца назад +1

    Hi, nice vid. IMHO one principle was missing. "Secure by default"

    • @jeffcrume
      @jeffcrume 4 месяца назад

      Great point!

  • @marnick322
    @marnick322 9 месяцев назад +2

    thanks

  • @balarabetahir7141
    @balarabetahir7141 Месяц назад +1

    Thia channel is underrated

    • @jeffcrume
      @jeffcrume Месяц назад

      Thanks for saying so!

  • @mountp1391
    @mountp1391 4 месяца назад +1

    very good video

  • @SteveM-io4yn
    @SteveM-io4yn 2 месяца назад +1

    Great information! Thank you. Is there a transcript that can be downloaded?

    • @jeffcrume
      @jeffcrume Месяц назад

      Yes, click into the description and scroll down and you will find a link to the transcript. This should be the case for all the videos we do on the channel

  • @tyrojames9937
    @tyrojames9937 Год назад +2

    COOL👍🏾😎

  • @galaxycleaningegypt
    @galaxycleaningegypt 11 месяцев назад +2

    Would you organize the playlist of " Cybersecurity " for easy access

  • @user-gd4wt6oi7y
    @user-gd4wt6oi7y 17 дней назад

    As I pointed out the ultimate security in all levels are in the language of security firewalls from one point till end

  • @sidneyngafei8252
    @sidneyngafei8252 11 месяцев назад +3

    What about zero trust? Could that be one of the principles?

  • @HeatherFaraMS
    @HeatherFaraMS 10 месяцев назад +2

    How would you modify for a modern “data open by default” stance, where you want to encourage filesharing and collaboration across disciplines (only lock read on data and files internally with privacy rule)? How does read all line up with least privilege?

    • @jeffcrume
      @jeffcrume 10 месяцев назад +1

      It all depends upon the value and sensitivity of the data. For some, just ensuring that it isn’t tampered with by making it read only is fine but for others we may need much tighter controls. More on this in the Data Security video later in the series…

  • @dewaynebranch776
    @dewaynebranch776 Год назад +2

    Greetings Professor, how do see security from a monolithic archicteture as different from a hybrid cloud archicteture? How does do you see DevSecOps and zero trust as necessary cybersecurity skill set for the Enterprise needs?

  • @user-zu2mi7je9d
    @user-zu2mi7je9d 5 месяцев назад +1

    Thanks for this video. How do you ensure that the public key is unique to the user ? If i change my computer, how retain my private key ?
    How do you ensure ia cannot find the private key associated with public one, if mathematically associated ?

    • @jeffcrume
      @jeffcrume 4 месяца назад

      There are a number of ways to handle this depending on the level of security you need. The easiest is to use an encrypted cloud sync service. Another is to have the keys stored in removable hardware that is tamper resistant. In some cases, you may just decide to have different keys for different devices. All depends on the needs of the particular use case

  • @jmlfa
    @jmlfa 2 месяца назад +1

    I am a lot more worried about AI "response" poisoning than I am about data poisoning ... Remember Schumer, Schiff and the Department of Truth?

  • @ABDUL_Hameed_00
    @ABDUL_Hameed_00 10 месяцев назад +2

    Hi how can I start my career in cyber security
    Can anyone please suggest how should I start

  • @margota8342
    @margota8342 Год назад +2

    Do you need to know a programming language to use cyber security fully?

    • @jeffcrume
      @jeffcrume Год назад

      No. There are plenty of jobs in cybersecurity that don’t involve coding.

  • @dillip4572
    @dillip4572 4 месяца назад +1

    Goodjob sir. Can we use https instead of http :)

  • @amitchandak1526
    @amitchandak1526 3 месяца назад +1

    Can someone help me with the tool he's using for creating this video, how is he marking and doing it in front ?

    • @jeffcrume
      @jeffcrume 3 месяца назад

      Sure, search the channel for “how we make them” and you’ll see me in a video explaining

  • @Dr.CherylCooper
    @Dr.CherylCooper 3 дня назад

    Can I get a copy of the PowerPoint slides please.

  • @God1293
    @God1293 Год назад +2

    ❤❤❤

  • @user-gd4wt6oi7y
    @user-gd4wt6oi7y 17 дней назад

    How they reached there with the encryption key is software developed which then clears the encryption into legit reading😊

  • @s11-informationatyourservi44
    @s11-informationatyourservi44 11 месяцев назад +2

  • @user-ym3rc7xy2d
    @user-ym3rc7xy2d 3 месяца назад +1

    Can verification by other my device be an example duty sep????i mean credit cards verification

    • @jeffcrume
      @jeffcrume 3 месяца назад

      Typically we think of SOD as involving multiple people whereas what I think you are describing is more like multi-factor authentication, if I’m understanding your comment

  • @samraalmas
    @samraalmas 8 месяцев назад +1

    hi i am a CS graduate but have a very little about cybersecurity. I want to start the career but it seems like it's a very vast field with multiple paths. Can anyone please guide me where to start. I am also planning to apply for erasmus mundus scholarship for master program in cybersecurity. What should I have to ace this scholarship?

  • @bobanmilisavljevic7857
    @bobanmilisavljevic7857 9 месяцев назад +2

    🥳👍

  • @maZumaZungu
    @maZumaZungu 10 месяцев назад +2

    🙏🙏🙏🙏🙏❤

  • @mikechickenman
    @mikechickenman 3 месяца назад +1

    Showing off those lefty superpowers.

    • @jeffcrume
      @jeffcrume 3 месяца назад

      Ha! If only, I could. Search in the channel for the video I did on “how we make them” and you’ll find out I’m actually not a lefty … 😊

  • @Illiakubasov
    @Illiakubasov 4 дня назад

    i love agry dog)

  • @a4ldev933
    @a4ldev933 7 месяцев назад +1

    @4;10 you said,, the user is also responsible for security. I beg the difference. The user is NOT responsible for security. It is the job of the designer and implementor. For example: I'm a user who can access to my bank account via a bank portal. No one holds me responsible for security of the website.

    • @jeffcrume
      @jeffcrume 7 месяцев назад +4

      I understand you point but would say that you as a user still bear some of the responsibility such as to pick a good password and not share it. Security is the responsibility of everyone to various degrees

    • @MikeHunt2565
      @MikeHunt2565 6 месяцев назад

      Yeah dont be stupid and make simple passwords or leave all your SPII or PII accessible lol

    • @rickyswan8216
      @rickyswan8216 6 месяцев назад +2

      The user is totally responsible for security,
      In a workplace environment staff must understand their responsibilities to ensure data is protected using a cyber hygiene approach.
      Since the human is the weakest link in the chain, the end user can be vulnerable therefore annual training should be in place for staff to understand the importance of security and what to be aware of and how they can help defend.
      Everyone has a part to play to defend.

    • @Dalai33
      @Dalai33 6 месяцев назад +2

      This is the type of mindset that would get the whole org in trouble.

    • @YourDailyR
      @YourDailyR 6 месяцев назад

      Are you drunk? Your bank will never pay you if they hijack your login. Don’t lock your door, the government is responsible for your security. 😂

  • @nicholastoo858
    @nicholastoo858 2 месяца назад

    Tell IBM to start making laptops.

  • @user-gd4wt6oi7y
    @user-gd4wt6oi7y 17 дней назад

    I cannot say how good excited I am feeling knowing now what I know to create something wonderful simple for everyday consumers

  • @wolfhunter4jesus118
    @wolfhunter4jesus118 7 месяцев назад +1

    Why can't my text book explain it like this!

    • @jeffcrume
      @jeffcrume 7 месяцев назад

      I had the same reaction back in the days when I was a student. Now that I’m teaching, I’m trying to take a different approach

  • @arifulislamleeton
    @arifulislamleeton 9 месяцев назад +2

    Hi I'm Ariful Islam leeton im software developer and Students connect cyber security

  • @user-gd4wt6oi7y
    @user-gd4wt6oi7y 17 дней назад

    Yet everything is being attacked it means enemies within and some crazed fixated lowlife obsessors on individuals creating havoc control decimation of their lives. Therefore ultimately security in consumers hands I figured this long time back as bastard obsessor kept moving with me wherever i went, neither the bastard as such has hole to face me or has any interest except block my life and with abuse horrific ones that too

  • @jann9507
    @jann9507 2 месяца назад

    The video was a mish mash of best practices, tools, process, some architecture and people responsibility
    Disappointing

  • @krishnansekaran6121
    @krishnansekaran6121 3 месяца назад

    what an idiotic way of teaching cybersecurity. the vast majority do not understand how the OSI model works, they just rely on software to help them find out things. the damn thing is called firewall. using all these acronyms does not make this teacher and other that smart.