10 Principles for Secure by Design: Baking Security into Your Systems

  Рет қаралды 12,961

IBM Technology

IBM Technology

Күн бұрын

Пікірлер: 36
@yt-sh
@yt-sh 2 ай бұрын
Thank you for teaching us all this useful / critical knowledge! 0:50 Principle of least privilege (PLP) - Give developers etc only what they need for them to do their job Like RBAC 2:14 Defense in depth - Layers of defence for robustness: IAM + MFA → UEM → FW + NIPS → Access Ctrl (PLP) + Scan → Encrypt. + BUp/ restore 5:03 Failsafe - When anything fails as they might, at least fail into a secure position 6:15 KISS - Keep It Simple Silly - To detect flaws 7:00 Separation of Duty - Like MFA but with people instead of devices 7:50 Open By Design - Show the software to detect flaws but lock it with keys 9:27 Segmentation - Segment systems with different security and sensitivity so damage doesn't spread 10:50 Usability - With complexity, user might store password openly etc, making it even less secure 12:50 Minimise attack surface - Limit external interfaces, Limit remote access, etc 14:18 Secure by default - Principle of least privilege, unique credentials to access made on the go Might have missed / wrongly interpreted some things, do watch the video
@snehotoshbanerjee1938
@snehotoshbanerjee1938 6 күн бұрын
Excellent!! I am great fan of this channel. Complex concept in easy way.
@jeffcrume
@jeffcrume 6 күн бұрын
I’m so glad you liked it!
@robertfoertsch
@robertfoertsch 23 күн бұрын
Excellent Analysis, Deployed Worldwide Through My Deep Learning AI Research Library. Thank You ❤
@AviOz-i2h
@AviOz-i2h 15 күн бұрын
Great video on security principles.
@jeffcrume
@jeffcrume 12 күн бұрын
Glad you liked it!
@cyberdaei
@cyberdaei Ай бұрын
Thank you for the lesson, IBM Technology has been my university for cybersecurity from 2 years ago and I inspired alot from Mr Crume and his way of toturing. Is there any platform or other content from Jeff Crume(I realy want to follow his courses from the university of Plymouth but i cannot apply for it)? I realy want to follow and learn as much as possible in his methodology. Already watched all videos about Cybersecurity in this channel and appreciate for all efforts. Thank you IBM guys ;)
@StopWhining491
@StopWhining491 Ай бұрын
Excellent presentation tying security to the development stage.
@NK-iw6rq
@NK-iw6rq Ай бұрын
Excellent video covering some of the most important principles and philosophies when it comes to information security.
@jeffcrume
@jeffcrume Ай бұрын
So glad you liked it!
@samiaamin43
@samiaamin43 Ай бұрын
Thank you for another great video Jeff!! I have always struggled with the KISS concept. I thought complex = secure or a t least our IT dep made us think that.
@jeffcrume
@jeffcrume Ай бұрын
I know what you mean. We want it to be complex for the attack but simple for the defenders. Easier said than done at times, though
@tharunragumar4850
@tharunragumar4850 2 ай бұрын
Thank you it was very helpful,im a college student,my security systems syllabus only covered the general stuff but learning in depth like this great
@jeffcrume
@jeffcrume 2 ай бұрын
Glad you liked it!
@pintobean8935
@pintobean8935 Ай бұрын
Thank you for another wonderful Video. Your examples make it so much easier to understand. I do have a Q about #5 Separation of Duties: Your description/example seemed like that two people are required to do the same task, basically a two-man role. However, as I understood, separation of duties meant more like an Admin could not be the same person reviewing the security logs of a system that way 1 person cannot cover their tracks. Is it possible to provide some clarification. Thank you.
@jeffcrume
@jeffcrume Ай бұрын
I’m glad you liked it. Yes, your example would also fit for SOD. Basically, it involves separating what could have theoretically done by one person so that you are forcing a sort of built in oversight
@brijeshkumar-pe4yn
@brijeshkumar-pe4yn 2 ай бұрын
Thank you!! ❤
@iheanyinwankwo7093
@iheanyinwankwo7093 Ай бұрын
Thank you for this video. Could you also do a similar video for „Requirements“? Thanks
@jeffcrume
@jeffcrume Ай бұрын
Thanks for the sugggestion
@empatikokumalar8202
@empatikokumalar8202 2 ай бұрын
Is this KZbin channel a real IBM channel?
@gideondray
@gideondray 2 ай бұрын
Yes it is
@victorpinasarnault9135
@victorpinasarnault9135 2 ай бұрын
Yes, sure.
@jeffcrume
@jeffcrume 2 ай бұрын
It absolutely is. I’ve been with IBM almost 42 years
@empatikokumalar8202
@empatikokumalar8202 2 ай бұрын
@@jeffcrume Why can't I contact IBM privately then? I have a great offer. I couldn't even find an e-mail address where I could communicate properly. If you know, please give me your e-mail address or give me yours so I can write privately.
@kenneencail
@kenneencail 2 ай бұрын
Yeah, these are videos from IBMs actual training programs Skill Builder or something like that. You can get really easy IBM Certs just for watching these short videos and answering questions about them.
@foreverergouzi
@foreverergouzi Ай бұрын
i didn't understand why open system is more secure. I don't think the video explained the "why". anyone got it?
@jeffcrume
@jeffcrume Ай бұрын
Making a system open means that it can be inspected by more experts and vulnerabilities found and fixed. It’s not a guarantee, though. I did a video looking at open source software and whether it is more secure so you might want to check that one out on the IBM technology channel “is open source more secure?”
@lohit3485
@lohit3485 Ай бұрын
What was explained in that sticky notes?
@blogcorpo
@blogcorpo Ай бұрын
♥♥
@patrickmaartense7772
@patrickmaartense7772 2 ай бұрын
fail safe in OT will open when not working as the A is more important ( Availability) rest makes sense....
@1ForTheShieldz
@1ForTheShieldz 21 күн бұрын
Also don't use java its the most buggy language full of vulnerabilities, c# is by far a more elegant and secure language and more advanced by a long way.
@Pettynicolla-HD-N.Ayeshamedina
@Pettynicolla-HD-N.Ayeshamedina 2 ай бұрын
Hello #IBM
@ErikS-
@ErikS- Ай бұрын
My main strategy: NEVER use Microsoft Windows!
@salonsospain
@salonsospain 2 ай бұрын
031
@salonsospain
@salonsospain 2 ай бұрын
1727
@superfliping
@superfliping Ай бұрын
Can I give you better terminology in a positive manner keep it simple smart
Cybersecurity Architecture: Networks
27:31
IBM Technology
Рет қаралды 140 М.
CompTIA Security+ SY0-701 - DOMAIN 1 COMPLETE
1:58:25
Inside Cloud and Security
Рет қаралды 87 М.
Não sabe esconder Comida
00:20
DUDU e CAROL
Рет қаралды 61 МЛН
Seja Gentil com os Pequenos Animais 😿
00:20
Los Wagners
Рет қаралды 86 МЛН
Perfect Pitch Challenge? Easy! 🎤😎| Free Fire Official
00:13
Garena Free Fire Global
Рет қаралды 34 МЛН
黑的奸计得逞 #古风
00:24
Black and white double fury
Рет қаралды 30 МЛН
SC-900 Microsoft Security, Compliance, and Identity Fundamentals Study Cram V2
1:59:31
John Savill's Technical Training
Рет қаралды 28 М.
Cybersecurity Architecture: Who Are You? Identity and Access Management
31:15
Passwords vs. Passkeys - FIDO Bites Back!
11:05
IBM Technology
Рет қаралды 48 М.
Scale an App to Millions of Users - System Design
45:51
Caleb Curry
Рет қаралды 13 М.
Breaking into AI Ethics Consulting
39:01
BABL AI Inc.
Рет қаралды 8 М.
How to beef up your home's security
8:41
The FieldCraft Survival Channel
Рет қаралды 161 М.
Cybersecurity Architecture: Five Principles to Follow (and One to Avoid)
17:34
How To Protect Your Linux Server From Hackers!
20:38
LiveOverflow
Рет қаралды 303 М.
How to Secure AI Business Models
13:13
IBM Technology
Рет қаралды 27 М.
Não sabe esconder Comida
00:20
DUDU e CAROL
Рет қаралды 61 МЛН