Thank you for teaching us all this useful / critical knowledge! 0:50 Principle of least privilege (PLP) - Give developers etc only what they need for them to do their job Like RBAC 2:14 Defense in depth - Layers of defence for robustness: IAM + MFA → UEM → FW + NIPS → Access Ctrl (PLP) + Scan → Encrypt. + BUp/ restore 5:03 Failsafe - When anything fails as they might, at least fail into a secure position 6:15 KISS - Keep It Simple Silly - To detect flaws 7:00 Separation of Duty - Like MFA but with people instead of devices 7:50 Open By Design - Show the software to detect flaws but lock it with keys 9:27 Segmentation - Segment systems with different security and sensitivity so damage doesn't spread 10:50 Usability - With complexity, user might store password openly etc, making it even less secure 12:50 Minimise attack surface - Limit external interfaces, Limit remote access, etc 14:18 Secure by default - Principle of least privilege, unique credentials to access made on the go Might have missed / wrongly interpreted some things, do watch the video
@snehotoshbanerjee19386 күн бұрын
Excellent!! I am great fan of this channel. Complex concept in easy way.
@jeffcrume6 күн бұрын
I’m so glad you liked it!
@robertfoertsch23 күн бұрын
Excellent Analysis, Deployed Worldwide Through My Deep Learning AI Research Library. Thank You ❤
@AviOz-i2h15 күн бұрын
Great video on security principles.
@jeffcrume12 күн бұрын
Glad you liked it!
@cyberdaeiАй бұрын
Thank you for the lesson, IBM Technology has been my university for cybersecurity from 2 years ago and I inspired alot from Mr Crume and his way of toturing. Is there any platform or other content from Jeff Crume(I realy want to follow his courses from the university of Plymouth but i cannot apply for it)? I realy want to follow and learn as much as possible in his methodology. Already watched all videos about Cybersecurity in this channel and appreciate for all efforts. Thank you IBM guys ;)
@StopWhining491Ай бұрын
Excellent presentation tying security to the development stage.
@NK-iw6rqАй бұрын
Excellent video covering some of the most important principles and philosophies when it comes to information security.
@jeffcrumeАй бұрын
So glad you liked it!
@samiaamin43Ай бұрын
Thank you for another great video Jeff!! I have always struggled with the KISS concept. I thought complex = secure or a t least our IT dep made us think that.
@jeffcrumeАй бұрын
I know what you mean. We want it to be complex for the attack but simple for the defenders. Easier said than done at times, though
@tharunragumar48502 ай бұрын
Thank you it was very helpful,im a college student,my security systems syllabus only covered the general stuff but learning in depth like this great
@jeffcrume2 ай бұрын
Glad you liked it!
@pintobean8935Ай бұрын
Thank you for another wonderful Video. Your examples make it so much easier to understand. I do have a Q about #5 Separation of Duties: Your description/example seemed like that two people are required to do the same task, basically a two-man role. However, as I understood, separation of duties meant more like an Admin could not be the same person reviewing the security logs of a system that way 1 person cannot cover their tracks. Is it possible to provide some clarification. Thank you.
@jeffcrumeАй бұрын
I’m glad you liked it. Yes, your example would also fit for SOD. Basically, it involves separating what could have theoretically done by one person so that you are forcing a sort of built in oversight
@brijeshkumar-pe4yn2 ай бұрын
Thank you!! ❤
@iheanyinwankwo7093Ай бұрын
Thank you for this video. Could you also do a similar video for „Requirements“? Thanks
@jeffcrumeАй бұрын
Thanks for the sugggestion
@empatikokumalar82022 ай бұрын
Is this KZbin channel a real IBM channel?
@gideondray2 ай бұрын
Yes it is
@victorpinasarnault91352 ай бұрын
Yes, sure.
@jeffcrume2 ай бұрын
It absolutely is. I’ve been with IBM almost 42 years
@empatikokumalar82022 ай бұрын
@@jeffcrume Why can't I contact IBM privately then? I have a great offer. I couldn't even find an e-mail address where I could communicate properly. If you know, please give me your e-mail address or give me yours so I can write privately.
@kenneencail2 ай бұрын
Yeah, these are videos from IBMs actual training programs Skill Builder or something like that. You can get really easy IBM Certs just for watching these short videos and answering questions about them.
@foreverergouziАй бұрын
i didn't understand why open system is more secure. I don't think the video explained the "why". anyone got it?
@jeffcrumeАй бұрын
Making a system open means that it can be inspected by more experts and vulnerabilities found and fixed. It’s not a guarantee, though. I did a video looking at open source software and whether it is more secure so you might want to check that one out on the IBM technology channel “is open source more secure?”
@lohit3485Ай бұрын
What was explained in that sticky notes?
@blogcorpoАй бұрын
♥♥
@patrickmaartense77722 ай бұрын
fail safe in OT will open when not working as the A is more important ( Availability) rest makes sense....
@1ForTheShieldz21 күн бұрын
Also don't use java its the most buggy language full of vulnerabilities, c# is by far a more elegant and secure language and more advanced by a long way.
@Pettynicolla-HD-N.Ayeshamedina2 ай бұрын
Hello #IBM
@ErikS-Ай бұрын
My main strategy: NEVER use Microsoft Windows!
@salonsospain2 ай бұрын
031
@salonsospain2 ай бұрын
1727
@superflipingАй бұрын
Can I give you better terminology in a positive manner keep it simple smart