Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)

2024 ж. 12 Мам.
278 934 Рет қаралды

IBM Security QRadar EDR : ibm.biz/Bdyd7k
IBM Security X-Force Threat Intelligence Index 2023: ibm.biz/Bdyd76
This ten part video series is based on a 400 level class on Enterprise Cybersecurity Architecture taught by Jeff "the Security Guy" Crume at a local university. He'll begin by explaining the foundational principles of cybersecurity - five that are best practices and one that's just the opposite. The subsequent episodes will look at the various domains that apply to a well-designed security architecture. Be sure to subscribe so you'll get notified of the next video!
Get started for free on IBM Cloud → ibm.biz/ibm-cloud-sign-up
Subscribe to see more videos like this in the future → ibm.biz/subscribe-now
#AI #Software #ITModernization #Cybersecurity #QRadar #JeffCrume #ibm
Chapters
00:00 Principles Introduction
01:05 Defense in Depth
04:20 Least Privilege
07:55 Separation of Duties
09:50 Secure by Design
12:15 Keep It Simple, Stupid (KISS)
14:43 Security by Obscurity

Пікірлер
  • You do a great job of explaining these fundamental concepts.

    @berniereid4200@berniereid42009 ай бұрын
  • Super stuff and thanks for the great presentation. Simple and concise.

    @sushantkumardevata5925@sushantkumardevata59257 ай бұрын
  • Thank you for this. Looking forward to more in the future!

    @funkykong9001@funkykong900111 ай бұрын
  • This channel is so underrated

    @Dalai33@Dalai336 ай бұрын
    • I’m glad you are finding value in it!

      @jeffcrume@jeffcrume6 ай бұрын
    • I like the clarity in these lectures this is the best

      @kudakwashekucherera1889@kudakwashekucherera18894 ай бұрын
    • Learned a lot from them.

      @kurttaguba17@kurttaguba173 ай бұрын
    • Highly underrated

      @manassahyoung8218@manassahyoung82183 ай бұрын
    • 10 / 10 conceptually, but I wish they would dive into some code every once in a while

      @initialized@initialized3 ай бұрын
  • Great series, learned a lot. Thank you.

    @jubrilamodu6699@jubrilamodu66999 ай бұрын
  • I completed IBM's Cybersecurity Analyst course and got my certificate, I'm here to refine my knowledge before applying a CS architect job

    @umeyrsekban4721@umeyrsekban47215 ай бұрын
    • Excellent! Good luck to you in your learning journey!

      @jeffcrume@jeffcrume3 ай бұрын
  • God bless you for sharing this!!

    @PinkYellowGreen2023@PinkYellowGreen20237 ай бұрын
  • Thank you won't be enough to show our gratitude for the content ❤ Looking forward to the next video in this series

    @AshishGupta-xn5yj@AshishGupta-xn5yj11 ай бұрын
    • Your kind comments are more than enough! Thank you!

      @jeffcrume@jeffcrume11 ай бұрын
  • This is gold, thank you very much! looking forward for the rest of the series!!

    @mehdisoussi9141@mehdisoussi914111 ай бұрын
    • Thanks for the encouraging feedback!

      @jeffcrume@jeffcrume11 ай бұрын
  • I learned a lot from the cybersecurity 10 videos series, I was always fascinated with security and this serie was water-satisfying... Particulary a value among many values that I learned is these fundamentals from the first video, that we should put multiple lines of defense and not rely on one defense to avoid the one single point of failure, another one is that complexity is the enemy of security, that one was very intresting to me... All the practices that you noted we should avoid and best practices that you propone are very valuable. Thank you very much!!

    @user-nh4mi5ed7q@user-nh4mi5ed7q8 ай бұрын
    • You learned the lessons well!

      @jeffcrume@jeffcrume8 ай бұрын
  • Really Thank you for sharing the knowledge.

    @khurramwzd@khurramwzd11 ай бұрын
  • Great video, very comprehensive

    @edwinrosales6322@edwinrosales63227 ай бұрын
  • Great video! Very clear explanation, thank you :)

    @sebasmen@sebasmen11 ай бұрын
  • I highly recommend this for anyone who is pursuing Cybersecurity at a total beginner level like myself. I’m watching these along with my IBM Cybersecurity Analyst Cert course, and it’s really helped me understand concepts that were so over my head at first. Really appreciate it!

    @BSC2CGYM@BSC2CGYM3 ай бұрын
    • I appreciate your watching and giving such great feedback!

      @jeffcrume@jeffcrume3 ай бұрын
  • Totally enjoyed this primer on Cybersecurity. The explanation and use of visuals were informative.

    @oscarjim3@oscarjim37 ай бұрын
    • Thanks so much!

      @jeffcrume@jeffcrume7 ай бұрын
  • Loved the video. SImple, but quite insightful. Please keep making videos on Cyber security.

    @geekengr@geekengr7 ай бұрын
    • Thanks for saying so!

      @jeffcrume@jeffcrume7 ай бұрын
  • Thanks for thoose basics delivery. Will continue on with other Subjs of Your track in further videos. Shaking Your hand 🤝

    @liquidatmosphere5528@liquidatmosphere55286 ай бұрын
    • Thanks for the virtual handshake! 🤝

      @jeffcrume@jeffcrume6 ай бұрын
  • I cannot say how good excited I am feeling knowing now what I know to create something wonderful simple for everyday consumers

    @user-gd4wt6oi7y@user-gd4wt6oi7yКүн бұрын
  • I have been searching for this for a long time. You just said what I was looking for. Thank you very much!

    @aladdinaldhmary7188@aladdinaldhmary71884 ай бұрын
    • I love it! Glad I could help

      @jeffcrume@jeffcrume3 ай бұрын
  • Excellent content and neat, simple and clearly presented

    @sasathishkumar5791@sasathishkumar57916 ай бұрын
  • I love ❤️❤️❤️ these Videos. Thank you so much IBM. Please keep them coming.

    @abuwilliams7228@abuwilliams72288 ай бұрын
    • @abuwilliams7228 thanks so much for watching and for the great feedback!

      @jeffcrume@jeffcrume8 ай бұрын
  • The best masterclass on overall security. Crystal clear concept and razor sharp analysis.. I enjoyed and learned a lot.

    @pdillip1@pdillip1Ай бұрын
    • can agree no more. It's so great that you've got all my words when I was just about to text the Professor some same positive comments and attributes as token of personal thanks... My immediate impression on him is naturally simple: he is really a good teacher!!!

      @billlee5679@billlee567928 күн бұрын
    • I can’t tell you how much feedback like this means to me!

      @jeffcrume@jeffcrume14 күн бұрын
  • I have to say, this has gotta be one of the best cybersec vdos out there when it comes to architecture plays, very few vendors like Cisco, Palo Alto and IBM can actually boast an end-to-end cybersec strategy and Jeff you have done a fantastic job laying it out, keep those vdos coming!

    @RC19786@RC197863 ай бұрын
    • Thank you so very much for all the kind words! I really appreciate it!

      @jeffcrume@jeffcrume2 ай бұрын
  • Cheers, summarised and ppted in 5 seconds.

    @janno04@janno0411 ай бұрын
  • found your lecture very easy to follow and digest the concepts and ideas

    @ronaldchua2210@ronaldchua2210Ай бұрын
    • I’m so glad to hear that!

      @jeffcrume@jeffcrumeАй бұрын
  • Hey Jeff, given the high demand for cybersecurity would you be so kind to give a roadmap of how to get into cybersecurity - the certifications etc from beginner to master. I'm definitely gonna hop on this series as the videos come out.

    @seetsamolapo5600@seetsamolapo560011 ай бұрын
    • Hi Seetsa. Here's an attempt at that: kzhead.info/sun/Z6euiLKrbYWYoo0/bejne.html

      @jeffcrume@jeffcrume11 ай бұрын
  • I've watched all 10 videos - very good - lots of pointers for following up on. Thank you.

    @markfitz8315@markfitz83153 ай бұрын
    • Thank you for watching!

      @jeffcrume@jeffcrume2 ай бұрын
  • Sir. I must salute you in a standing position. I mean I don't have words to praise you. Just watched your first video and I subscribed. Now watch the second video. Your way of communicating cyber security is so simple and easy to understand that this is as it should be.

    @mudasirmalikawan4769@mudasirmalikawan47697 ай бұрын
    • You’re very kind to say so! I love making these videos and the payoff is reading comments like yours that make the effort all worthwhile!

      @jeffcrume@jeffcrume7 ай бұрын
  • Thanks for making it easy to understand the main principles of security solutions and technologies we sell to our customers.

    @samsos7210@samsos7210Ай бұрын
    • You’re very welcome and thank you for watching!

      @jeffcrume@jeffcrumeАй бұрын
  • Thanks for sharing this nice demonstration. It is very rich in relevant information . As a beginner, it hepled me to understand good thigs.

    @fouadmouzoun4724@fouadmouzoun47248 ай бұрын
    • You’re very welcome!

      @jeffcrume@jeffcrume7 ай бұрын
  • Thank you Jeff, IBM for giving me this topic free.

    @Keteerfio@Keteerfio27 күн бұрын
    • You are most welcome!

      @jeffcrume@jeffcrume14 күн бұрын
  • many thanks of IBM for great information sharing. this series were fantastic too.

    @mohsenjebelli155@mohsenjebelli1554 ай бұрын
    • Many thanks to you for watching!

      @jeffcrume@jeffcrume3 ай бұрын
  • Great explanation, wonderful summarization, and perfect delivery. Your work here is very appreciated sir. Thank you very much.

    @aruizsilva@aruizsilva5 ай бұрын
    • Thanks so much for saying! And your viewing is very much appreciated as well!

      @jeffcrume@jeffcrume3 ай бұрын
  • Wow! this is so amazing. You have simplified this information so well, especially for someone like me who is pursuing a career in cybersecurity. currently preparing for my ISC2 cc Certification.

    @captainwalker94@captainwalker943 ай бұрын
    • I’m so glad you liked it! Best of luck on your certification pursuit!

      @jeffcrume@jeffcrume2 ай бұрын
  • Thank you so much for these 10-part series. I included the videos as study materials for my ISC2 Certified in Cybersecurity exam (I'm a newbie in Cybersecurity), and I'm glad to say i passed. Your explanations made the topics and concepts so easy to understand. Thank you!!!!

    @olubunmiboladale6293@olubunmiboladale62934 ай бұрын
    • Wow! Congratulations on that! I’m so glad to hear that these videos helped!

      @jeffcrume@jeffcrume3 ай бұрын
    • Same here. I'm currently listening to it while preparing for my ISC2 exam.

      @soremiolude225@soremiolude225Ай бұрын
  • Amazing job, Prof!

    @unchainedwarriortv@unchainedwarriortv7 ай бұрын
    • Thanks so much @chiedozieHez!

      @jeffcrume@jeffcrume7 ай бұрын
  • Man-in-the-middle attack! A wise man once said, learn something everyday, even if its something small. Thank you for teaching me something today...I just considered getting my certificate in cyber security and i'm starting this journey very soon!!! GREAT VIDEO

    @meribipucejera@meribipucejera3 ай бұрын
    • That’s great advice about learning something new every day! Glad I could help

      @jeffcrume@jeffcrume3 ай бұрын
  • Great lecture series. Thank you so much. 🙏👏👏👏

    @valentinussofa4135@valentinussofa41355 ай бұрын
    • Thank you for watching!

      @jeffcrume@jeffcrume3 ай бұрын
  • Thanks a lot for these lessons. They really make things quite clear fundamentally. Thanks a lot.

    @Work_inprogress@Work_inprogressАй бұрын
    • You are most welcome!

      @jeffcrume@jeffcrumeАй бұрын
  • IBM having many great learning videos, thanks.

    @FuzzerHash@FuzzerHash11 ай бұрын
  • Pretty clear explanations and examples. love it!

    @babakmahmoodizadeh172@babakmahmoodizadeh1725 ай бұрын
    • so glad to hear it!

      @jeffcrume@jeffcrume3 ай бұрын
  • Thank you for the great presentation and knowledge sharing.

    @jne9479@jne94793 ай бұрын
    • Thank you for watching!

      @jeffcrume@jeffcrume3 ай бұрын
  • Good stuff. Thanks

    @dirkl9652@dirkl965211 ай бұрын
  • Great video.

    @jervahnmorgan@jervahnmorgan11 ай бұрын
  • It's been years since I found learning enjoyable and thank you sir for creating such a great video.

    @SweetyPieDiscuss@SweetyPieDiscuss4 ай бұрын
    • Your comment made my day. Thank you!

      @jeffcrume@jeffcrume3 ай бұрын
  • I wore an NC State Wolfpack tee-shirt when I was around 9, 10 and 11. I turned 18 then officially wore the Hokie tee-shirts and sweatshirts 😁 😏, but I still love my Wolfpack tee 😊. Very informative and well explained video. Thanks for posting. 👍🏼👍🏼👌🏽

    @MichaelAlexander1967@MichaelAlexander19673 ай бұрын
    • Go Pack!!! 😊

      @jeffcrume@jeffcrume3 ай бұрын
  • Awesome explaination.

    @gubs_siramsana@gubs_siramsana7 күн бұрын
  • great infomation

    @CyberSecurityGurus@CyberSecurityGurus7 күн бұрын
  • really simply explained, I'm impressed

    @user-su2rm7jt3z@user-su2rm7jt3z3 ай бұрын
    • Thank you!

      @jeffcrume@jeffcrume2 ай бұрын
  • I remember someone who was so confident of his security arrangement that he posted his Social Security Number on billboards. It didn't end well...

    @baruchben-david4196@baruchben-david4196Ай бұрын
    • A predictable outcome 😂

      @jeffcrume@jeffcrume14 күн бұрын
  • Excellent!

    @ryancammer@ryancammer5 ай бұрын
  • Thank you :)

    @ishwaryanarayan1010@ishwaryanarayan1010Ай бұрын
  • simply superb

    @sasmeetasabat5995@sasmeetasabat5995Ай бұрын
    • Thank you!

      @jeffcrume@jeffcrumeАй бұрын
  • Outstanding sir. Excellent video brother!

    @themiseducationoftheameric7407@themiseducationoftheameric74073 ай бұрын
    • Thanks so much!

      @jeffcrume@jeffcrume2 ай бұрын
  • Very good

    @igsayi@igsayi11 ай бұрын
  • Ty!

    @karengomez3143@karengomez31439 ай бұрын
  • Greetings Professor, how do see security from a monolithic archicteture as different from a hybrid cloud archicteture? How does do you see DevSecOps and zero trust as necessary cybersecurity skill set for the Enterprise needs?

    @dewaynebranch776@dewaynebranch77611 ай бұрын
  • Thanks a lot, Jeff!

    @bantuandproud8456@bantuandproud84564 ай бұрын
    • My pleasure!

      @jeffcrume@jeffcrume3 ай бұрын
  • Thanks ❤

    @jagatkrishna1543@jagatkrishna15434 ай бұрын
  • Would you organize the playlist of " Cybersecurity " for easy access

    @galaxycleaningegypt@galaxycleaningegypt11 ай бұрын
  • Thanks a lot.

    @kareemelfetiany2042@kareemelfetiany20427 ай бұрын
  • How would you modify for a modern “data open by default” stance, where you want to encourage filesharing and collaboration across disciplines (only lock read on data and files internally with privacy rule)? How does read all line up with least privilege?

    @HeatherFaraMS@HeatherFaraMS9 ай бұрын
    • It all depends upon the value and sensitivity of the data. For some, just ensuring that it isn’t tampered with by making it read only is fine but for others we may need much tighter controls. More on this in the Data Security video later in the series…

      @jeffcrume@jeffcrume9 ай бұрын
  • IBM and Google are my most favourites.

    @kr_international_8608@kr_international_86083 ай бұрын
  • COOL👍🏾😎

    @tyrojames9937@tyrojames993711 ай бұрын
  • Great information! Thank you. Is there a transcript that can be downloaded?

    @SteveM-io4yn@SteveM-io4ynАй бұрын
    • Yes, click into the description and scroll down and you will find a link to the transcript. This should be the case for all the videos we do on the channel

      @jeffcrume@jeffcrumeАй бұрын
  • Awesome content perfectly crafted! ❤ And No exams! 😂🎉

    @sachinmagdum@sachinmagdum3 ай бұрын
    • No exams for me to have to grade too! Win-win!!! 😊

      @jeffcrume@jeffcrume3 ай бұрын
  • Great explanation

    @iraianbutech1350@iraianbutech13502 ай бұрын
    • Thanks!

      @jeffcrume@jeffcrumeАй бұрын
  • Million dollar knowledge, 🙏

    @claudiabucknor7159@claudiabucknor71596 ай бұрын
  • amazing content

    @g9udaya@g9udayaАй бұрын
    • Thank you!

      @jeffcrume@jeffcrumeАй бұрын
  • Thanks for this video. How do you ensure that the public key is unique to the user ? If i change my computer, how retain my private key ? How do you ensure ia cannot find the private key associated with public one, if mathematically associated ?

    @user-zu2mi7je9d@user-zu2mi7je9d5 ай бұрын
    • There are a number of ways to handle this depending on the level of security you need. The easiest is to use an encrypted cloud sync service. Another is to have the keys stored in removable hardware that is tamper resistant. In some cases, you may just decide to have different keys for different devices. All depends on the needs of the particular use case

      @jeffcrume@jeffcrume3 ай бұрын
  • Hi, nice vid. IMHO one principle was missing. "Secure by default"

    @juergenm6107@juergenm61074 ай бұрын
    • Great point!

      @jeffcrume@jeffcrume3 ай бұрын
  • What about zero trust? Could that be one of the principles?

    @sidneyngafei8252@sidneyngafei825210 ай бұрын
  • very good video

    @mountp1391@mountp13913 ай бұрын
    • Thanks!

      @jeffcrume@jeffcrume3 ай бұрын
  • thanks

    @marnick322@marnick3229 ай бұрын
    • Welcome

      @arifulislamleeton@arifulislamleeton9 ай бұрын
  • As I pointed out the ultimate security in all levels are in the language of security firewalls from one point till end

    @user-gd4wt6oi7y@user-gd4wt6oi7yКүн бұрын
  • hi i am a CS graduate but have a very little about cybersecurity. I want to start the career but it seems like it's a very vast field with multiple paths. Can anyone please guide me where to start. I am also planning to apply for erasmus mundus scholarship for master program in cybersecurity. What should I have to ace this scholarship?

    @samraalmas@samraalmas8 ай бұрын
  • ❤❤❤

    @God1293@God129311 ай бұрын
  • 🥳👍

    @bobanmilisavljevic7857@bobanmilisavljevic78579 ай бұрын
  • I am a lot more worried about AI "response" poisoning than I am about data poisoning ... Remember Schumer, Schiff and the Department of Truth?

    @jmlfa@jmlfaАй бұрын
  • @s11-informationatyourservi44@s11-informationatyourservi4411 ай бұрын
  • Thia channel is underrated

    @balarabetahir7141@balarabetahir7141Ай бұрын
    • Thanks for saying so!

      @jeffcrume@jeffcrume14 күн бұрын
  • Hi how can I start my career in cyber security Can anyone please suggest how should I start

    @ABDUL_Hameed_00@ABDUL_Hameed_0010 ай бұрын
  • How they reached there with the encryption key is software developed which then clears the encryption into legit reading😊

    @user-gd4wt6oi7y@user-gd4wt6oi7yКүн бұрын
  • Can verification by other my device be an example duty sep????i mean credit cards verification

    @user-ym3rc7xy2d@user-ym3rc7xy2d3 ай бұрын
    • Typically we think of SOD as involving multiple people whereas what I think you are describing is more like multi-factor authentication, if I’m understanding your comment

      @jeffcrume@jeffcrume3 ай бұрын
  • Goodjob sir. Can we use https instead of http :)

    @dillip4572@dillip45724 ай бұрын
    • Please do!

      @jeffcrume@jeffcrume3 ай бұрын
  • Do you need to know a programming language to use cyber security fully?

    @margota8342@margota834211 ай бұрын
    • No. There are plenty of jobs in cybersecurity that don’t involve coding.

      @jeffcrume@jeffcrume11 ай бұрын
  • Can someone help me with the tool he's using for creating this video, how is he marking and doing it in front ?

    @amitchandak1526@amitchandak15262 ай бұрын
    • Sure, search the channel for “how we make them” and you’ll see me in a video explaining

      @jeffcrume@jeffcrume2 ай бұрын
  • 🙏🙏🙏🙏🙏❤

    @maZumaZungu@maZumaZungu10 ай бұрын
  • Tell IBM to start making laptops.

    @nicholastoo858@nicholastoo8582 ай бұрын
  • @4;10 you said,, the user is also responsible for security. I beg the difference. The user is NOT responsible for security. It is the job of the designer and implementor. For example: I'm a user who can access to my bank account via a bank portal. No one holds me responsible for security of the website.

    @a4ldev933@a4ldev9337 ай бұрын
    • I understand you point but would say that you as a user still bear some of the responsibility such as to pick a good password and not share it. Security is the responsibility of everyone to various degrees

      @jeffcrume@jeffcrume6 ай бұрын
    • Yeah dont be stupid and make simple passwords or leave all your SPII or PII accessible lol

      @MikeHunt2565@MikeHunt25656 ай бұрын
    • The user is totally responsible for security, In a workplace environment staff must understand their responsibilities to ensure data is protected using a cyber hygiene approach. Since the human is the weakest link in the chain, the end user can be vulnerable therefore annual training should be in place for staff to understand the importance of security and what to be aware of and how they can help defend. Everyone has a part to play to defend.

      @rickyswan8216@rickyswan82166 ай бұрын
    • This is the type of mindset that would get the whole org in trouble.

      @Dalai33@Dalai336 ай бұрын
    • Are you drunk? Your bank will never pay you if they hijack your login. Don’t lock your door, the government is responsible for your security. 😂

      @YourDailyR@YourDailyR5 ай бұрын
  • Why can't my text book explain it like this!

    @wolfhunter4jesus118@wolfhunter4jesus1186 ай бұрын
    • I had the same reaction back in the days when I was a student. Now that I’m teaching, I’m trying to take a different approach

      @jeffcrume@jeffcrume6 ай бұрын
  • Showing off those lefty superpowers.

    @mikechickenman@mikechickenman2 ай бұрын
    • Ha! If only, I could. Search in the channel for the video I did on “how we make them” and you’ll find out I’m actually not a lefty … 😊

      @jeffcrume@jeffcrume2 ай бұрын
  • Hi I'm Ariful Islam leeton im software developer and Students connect cyber security

    @arifulislamleeton@arifulislamleeton9 ай бұрын
  • Yet everything is being attacked it means enemies within and some crazed fixated lowlife obsessors on individuals creating havoc control decimation of their lives. Therefore ultimately security in consumers hands I figured this long time back as bastard obsessor kept moving with me wherever i went, neither the bastard as such has hole to face me or has any interest except block my life and with abuse horrific ones that too

    @user-gd4wt6oi7y@user-gd4wt6oi7yКүн бұрын
  • The video was a mish mash of best practices, tools, process, some architecture and people responsibility Disappointing

    @jann9507@jann95072 ай бұрын
  • what an idiotic way of teaching cybersecurity. the vast majority do not understand how the OSI model works, they just rely on software to help them find out things. the damn thing is called firewall. using all these acronyms does not make this teacher and other that smart.

    @krishnansekaran6121@krishnansekaran61213 ай бұрын
  • You are too Good

    @pankajnegi3605@pankajnegi36052 ай бұрын
    • Very kind of you!

      @jeffcrume@jeffcrumeАй бұрын
  • I completed IBM's Cybersecurity Analyst course and got my certificate, I'm here to refine my knowledge before applying a CS architect job

    @user-dj8oc3gl4m@user-dj8oc3gl4m2 ай бұрын
    • Congratulations on completing the course and best of luck to you!

      @jeffcrume@jeffcrume2 ай бұрын
  • @user-kf5kb3bd4d@user-kf5kb3bd4d5 ай бұрын
KZhead