Welcome, Students. Security is not a product you buy; it's a foundation you build.
The teaching materials are based on the Cybersecurity Architecture Series playlist by Prof. Jeff Crume.
In cybersecurity, we assume that eventually, a tool will fail. Good architecture ensures that when one thing fails, the whole system doesn't collapse. We call this being Failsafe.
Multiple layers of security. If a hacker passes the firewall, they still face MFA. If they pass MFA, they face encryption.
Users should only have the minimum access required for their job. If they don't need to delete files, don't give them "Delete" rights.
No single person should have total control over a sensitive process. Ensure no single person has complete control over a sensitive process. This prevents internal fraud by requiring collusion (two people working together) to do something bad.
Security is built into the project requirements from day one, not "bolted on" at the end. This is often called Continuous Integration of security.
Simplicity is vital. If security is too complex for employees, they will find "wrong but easy" workarounds (like writing passwords on sticky notes).
This is the flawed idea that a system is safe just because its design is a secret. Attackers will eventually figure out the "Black Box."
Kerckhoff's Principle: A cryptographic system should be secure even if everything about it (except the key) is public knowledge.
Click an answer to reveal the correct choice and explanation.