Cyber Defense Tips to Rival the NSA

Sdílet
Vložit
  • čas přidán 25. 07. 2024
  • Cyber defense is much more than security. “Security” can be misleading since it encourages people to think in terms of secure or insecure. This way of thinking leads to an overemphasis on preventative measures. Just like the human body, you need many more layers than that. A good cyber defense will also focus on deception, detection, and response in addition to prevention. In this video, we cover the four most important principles of cyber defense.
    #1 Security Architecture:
    You can’t defend what you can’t see. It’s really hard to build strong cyber defenses if the foundations aren’t sound. Security architecture is about improving visibility in the network through segmentation. You also want to maintain a good asset inventory and map to quickly identify what’s even there. Implementing policies like blocking removable media or blocking protocols are also architectural in nature.
    #2 Security Monitoring:
    Every asset connected to the network needs to generate telemetry. This gives you visibility into the activity occurring on them. Network traffic itself should also be sent to an IDS sensor like Snort or Zeek to generate security data from it. These logs should be aggregated and synced to a centralized location for monitoring. A team of analysts can build systems to detect and alert on anything anomalous. This team serves as the backbone of the network’s cyber defense.
    #3 Implement Choke Points
    For effective security monitoring, it’s key to limit the paths devices can communicate on. Blocking outbound traffic by default is the best way to do this. What is allowed to traverse the network then needs closer inspection. The best way to do this is to force clients to use a local DNS resolver or web proxy to access the Internet. Any traffic not destined for these inspection points is automatically suspect. What does go through can then be analyzed against blocklists or a reputation scoring service. Choke points not only restrict an attacker’s maneuverability but also make it easier to conduct proper cyber defense.
    #4 Harden Systems with a Security Baseline
    Systems running default configurations are highly vulnerable to generalized attacks. Deploying a security baseline on your assets ensures a consistent level of hardening against them. It also helps with managing change configuration on your network. Authorities like CIS, NIST, DISA, or vendors will all provide recommendations for different types of systems. These include operating systems, applications, phones, and network appliances. Whether it’s scripts, Group Policy Objectives, or Ansible playbooks, they’ll also offer ways to automatically apply baselines too.
    00:00 Intro: How to Improve Cyber Defense For Your Network
    01:11 The Biggest Misconception in Cyber Security
    02:52 Traditional v. Modern Cyber Defense
    05:02 Security Architecture & Building a Defensible Network
    07:44 Principles of Security Monitoring: Assets & Endpoints
    09:40 Create Choke Points In Your Network For Inspection
    12:11 Collect Traffic With Network Security Monitoring
    14:13 Hardening Systems with a Security Baseline
    16:52 Strategies for Implementing Your Cyber Defenses
    👍 LIKE AND SUBSCRIBE 📺
    ---- Resources ----
    Rob Joyce’s talk at USENIX Enigma 2016:
    • USENIX Enigma 2016 - N...
    #CyberDefense #DFIR #Cyberspatial
  • Věda a technologie

Komentáře • 130

  • @Cyberspatial
    @Cyberspatial  Před 3 lety +19

    What do you think are the most important aspects of a good cyber defense?

    • @MrFontaineInc
      @MrFontaineInc Před 3 lety +2

      Active Threat hunting and analysis
      Asset management and situational awareness
      Incident response and architecture
      Risk management framework with a solid cost benefit analysis to help an organization select the most effective controls for their type of information asset and risk appetite

    • @nonav5763
      @nonav5763 Před 3 lety +4

      Turn your fuckin Internet off

    • @vishalshakya7033
      @vishalshakya7033 Před 3 lety

      backup all data logs

    • @yangdave611
      @yangdave611 Před 3 lety +1

      Layers,layers,layers...

    • @Africalearn
      @Africalearn Před 3 lety

      people training awareness and crypto startegyst on usage on criticals assets

  • @justindittburner216
    @justindittburner216 Před 3 lety +53

    The quality on your videos are so far above most CZcamsrs that have millions of subscribers and an unlimited budget. Keep up the great work! Best cyber sec channel for sure!

    • @Cyberspatial
      @Cyberspatial  Před 3 lety +5

      Really appreciate the kind words. Thank You!

    • @Squarabh2
      @Squarabh2 Před 2 lety +1

      Totally Agree with you ! I'm glad I found this channel.

    • @mrkingmez
      @mrkingmez Před 2 lety +1

      Agreed

  • @rayancrasta7460
    @rayancrasta7460 Před 3 lety +34

    We really appreciate such high quality videos ❤️

  • @sagnik8760
    @sagnik8760 Před 3 lety +6

    Just luv dis Video Dude , Literally no-one talked about Cyber Defense till now...except u

  • @dencam
    @dencam Před 3 lety +7

    I appreciate the amount of effort and energy you put to produce these videos.

  • @mr_o47
    @mr_o47 Před 3 lety +2

    I don’t usually watch full videos but yours was an exception.
    Definitely loved the content delivery please never stop making this content

  • @wannabedal-adx458
    @wannabedal-adx458 Před rokem +1

    Dude, this was like 6 months of Cyber Defense training in 18 minutes. Thanks!! (Subscribed)

  • @TRADERSFRIEND
    @TRADERSFRIEND Před rokem +1

    You are addictive this morning, thank you for sharing your brilliance!!!!

  • @Francois-B-Arthanas
    @Francois-B-Arthanas Před 3 lety +7

    Sounds like you’ve taken some of the SANS courses! - Great content!!!!

  • @zackarysilva1618
    @zackarysilva1618 Před 3 lety

    Your editing is just stellar, really- since I started watching these videos I also can't help but wonder where you work. They must be lucky!

  • @liesdamnlies3372
    @liesdamnlies3372 Před 3 lety +3

    When it comes to knowing oneself, I prefer this quote from the game Alpha Centauri:
    “Information, the first principle of warfare, must form the foundation of all your efforts. Know, of course, thine enemy. But in knowing him do not forget above all to know thyself. The commander who embraces this totality of battle shall win even with the inferior force.”
    -Spartan Battle Manual
    I’m a total nerd, yes, but this is especially relevant to anyone trying to defend their organization from threat actors with superior resources (such as foreign states, which may be trying to infiltrate your networks and even your physical building to conduct espionage; I’m sure Boston Dynamics, for example, has these concerns).
    Or course I’m not discounting Sun Tzu. The Art of War is a fantastic book on how to deal with conflict. A great deal of it though is about diplomacy and _avoiding_ direct conflict through shrewd statesmanship and subterfuge. I’m not sure those parts are terribly relevant to cybersecurity, since we’re basically in a state of constant, open warfare at this point.

    • @Cyberspatial
      @Cyberspatial  Před 3 lety

      Excellent points! And I love nerding out!
      The idea of deception, diplomacy, and avoiding conflict is probably the heart and soul of AoW.
      Recommend reading Unrestricted Warfare, one of the first books discussing cyber warfare as a lateral alternative to kinetic warfare. Can avoid violence through informational means.
      Though from your perspective of avoiding cyber conflict, maybe the way to win is to respond in the kinetic.
      www.cyberscoop.com/hamas-cyberattack-israel-air-strikes/
      Thanks for sharing!

    • @liesdamnlies3372
      @liesdamnlies3372 Před 3 lety

      @@Cyberspatial Thanks. I'll definitely be looking those up...in between the studying for certs omg my brain ow

  • @robertcrier3551
    @robertcrier3551 Před 3 lety +3

    Man I wish I could put a ring on your channel. You have amazing content and I don't stress that enough!!! I always recommend this channel to people who take interest in cyber security. This is gold for nerds haha

  • @alfonso5645
    @alfonso5645 Před 3 lety +5

    This is such a good editing!

  • @nicolo2984
    @nicolo2984 Před 3 lety +3

    1 Day the NSA, CIA or the Homeland security will Hire this Man

  • @coldheat7373
    @coldheat7373 Před 3 lety +1

    This is one of your most useful videos yet. Thanks!

  • @noharmintended9691
    @noharmintended9691 Před 3 lety

    This channel is really a hidden gem, subscribed and if i can do it 1000 times more i would do that.

  • @skipinkoreaable
    @skipinkoreaable Před 2 lety +1

    What a brilliant video.

  • @siddheshghag5889
    @siddheshghag5889 Před 3 lety +3

    Excellent information with great example really good learning curve. Thanks and appreciate it.

  • @allsortsofstones
    @allsortsofstones Před 2 lety +1

    Very intelligent! Definitely an Expert!

  • @HouseJunk1e
    @HouseJunk1e Před 3 lety

    This channel is magnificent. Thank you.

  • @rrigaud88
    @rrigaud88 Před 3 lety +2

    Great video - you make a complex topic easy to digest

  • @chris8206
    @chris8206 Před 3 lety +1

    Awesome video with so much research

  • @bhargavyagnik3762
    @bhargavyagnik3762 Před 3 lety +1

    So smooth and pretty neat 👏🏻

  • @user-es1xd1zk4t
    @user-es1xd1zk4t Před 3 lety +2

    Great Video as always

  • @rogerioabreu3081
    @rogerioabreu3081 Před 3 lety +1

    Awesome Video!!!!!!!

  • @classicCyber
    @classicCyber Před 2 lety

    Waow that was very dense in information. Thanks man

  • @justabyte3157
    @justabyte3157 Před 2 lety

    PRO TIP: for people new in cyber security like me, watch on 0.5x or 0.75x to be able to digest all of this amazing information.

  • @YannMetalhead
    @YannMetalhead Před rokem

    Good video.

  • @jonathantant9611
    @jonathantant9611 Před 3 lety +1

    Highest of quality 🙌

  • @spongebobtechnologies9170

    THANKS, ALOT FOR THE EDUCATIVE LESSON

  • @patsyflanagan7178
    @patsyflanagan7178 Před 11 měsíci

    Brilliant

  • @akshayithape823
    @akshayithape823 Před 3 lety

    Worth information 🙌

  • @aiheyuer8627
    @aiheyuer8627 Před 3 lety

    I hardly understand your video content but I know it's really awesome to those who do. LOL

  • @sawyerschneider4733
    @sawyerschneider4733 Před 3 lety +1

    I'm still in high school, and I have an insurmountable amount of interest and curiosity when it comes to cybersecurity, and I'm very interested in pursuing it as my career, especially once I have completed high school. This begs the question, where do I start? What are some methods of education and self-education? And how do I maintain a consistently high amount of motivation when learning? I have no idea what path to take in order to start, as well as how to continue down it once I take it. Knowing this information would be a tremendous help. Thanks in advance!

    • @Cyberspatial
      @Cyberspatial  Před 3 lety +2

      Thanks for the questions!
      - Definitely start now and not later.
      - Start by reading books or PDFs recommended by the community.
      - Find a mentor by trying to add value to them first
      - If no mentor, find a learning buddy. Iron sharpens iron.
      - Community college classes are a great way to meet people and learn on the cheap.
      - Don't force yourself to learn things that don't interest you. It's okay to bounce around fields in the discovery phase.
      - Build a home lab
      - Build relationships with people you meet who are already in the field.

    • @sawyerschneider4733
      @sawyerschneider4733 Před 3 lety +1

      @@Cyberspatial Great, thanks for responding. Just a few questions:
      1. Are there any books that you yourself would recommend?
      2. What do you mean by "mentor," and how exactly do I find one?
      3. How would I go about putting myself out there in the community?

  • @eddy274
    @eddy274 Před 3 lety

    Appreciate the great vids, just wanted to ask your opinion on how much networking experience should I get before becoming a pen tester? Like should I do a few years as a network engineer first?

    • @Cyberspatial
      @Cyberspatial  Před 3 lety +1

      You can learn pentesting now, though having a year or two of networking, especially LINUX networking will be tremendously helpful.

    • @eddy274
      @eddy274 Před 3 lety

      Thanks 👍

  • @DisciplineUnleashed24
    @DisciplineUnleashed24 Před 3 lety

    Hi
    Can you please make more videos about cybersecurity and network. I have been following you for long time and I really love all of your videos, so please more videos.

  • @abdullahnadeem1823
    @abdullahnadeem1823 Před 2 lety +1

    What wallpaper are you using that is displayed on the monitor, would love to have it. Thanks

  • @AH-by4zz
    @AH-by4zz Před 3 lety

    Please upload a video on Pegasus

  • @vishalshakya7033
    @vishalshakya7033 Před 3 lety

    u r awsssm bro

  • @mabiaakter494
    @mabiaakter494 Před 3 lety +1

    Your contents are really awesome. But, I feel like you cover a lot in a day, can you suggest from where one can start cybersecurity?

  • @rogerioabreu3081
    @rogerioabreu3081 Před 3 lety +2

    8:42 SIEM stands for Security INFORMATION and Event Management. Not Incident.

    • @Cyberspatial
      @Cyberspatial  Před 3 lety +3

      Good catch 👍 I've seen it both ways before, but Information is right.

  • @Hybridious
    @Hybridious Před 2 lety +2

    If your developing your cyber security arsenal just remember the less you have to code the better. You shouldn't reinvent the wheel because of ego or diy attitude. Because open source tools are freely available and have been developed for similar tasks. It's better to modify there source at most or make a plugin for it. You should only really need to write configs and simple utils.

  • @abovethehorizon2023
    @abovethehorizon2023 Před 3 lety

    Great content. Thanks. Can you suggest me tool to monitor network bandwidth and traffic for an organisation?

    • @thorchris7353
      @thorchris7353 Před 3 lety +2

      Netcrunch, splunk, logic monitor and Wireshark this are tools to use gui mode no need to code. I am a security analyst google

    • @Cyberspatial
      @Cyberspatial  Před 3 lety +1

      ntop-ng

  • @kristopherleslie8343
    @kristopherleslie8343 Před rokem

    Still good video ❤

  • @nord4471
    @nord4471 Před 2 lety

    Everyone hit the nail on the head, adding comments to feed the yt algorithm

  • @mbookus3054
    @mbookus3054 Před 3 lety

    >watching these even though I know nothing about networking and am not setting up security networks for any businesses

  • @kristopherleslie8343
    @kristopherleslie8343 Před rokem

    Cyber defense is exhausting 😂❤❤ but seems fun

  • @pratik2998
    @pratik2998 Před 3 lety +1

    Hey. Can you please make a video on best books to read according to you. For IT in general? Like your top ten or top twenty list for the best books?nn

    • @Cyberspatial
      @Cyberspatial  Před 3 lety

      That's a great idea, like a series of book reviews?

    • @pratik2998
      @pratik2998 Před 3 lety

      @@Cyberspatial yes something like that. I'm new to the IT industry and its difficult to figure out which books to refer to. So u could help us filter out the most important books of all time. I saw in one of your videos you said read books a lot.

  • @synack2165
    @synack2165 Před 3 lety

    Where did you find the video of the girl juggling @1:33? She looks so familiar.

    • @Cyberspatial
      @Cyberspatial  Před 3 lety +1

      Actors appear in lots of different stock footages. You may have seen her in another one.

  • @monkeydono
    @monkeydono Před 2 lety

    Hello, is anyone able to share the NIST publication?
    I've been searching for it but with no luck.
    I'm studying cybersecurity so I'm making a research. This video is very helpful, thanks!

    • @monkeydono
      @monkeydono Před 2 lety

      I've founded it if anyone wants to read it: nvlpubs.nist.gov/nistpubs/Legacy/SP/nbsspecialpublication500-19.pdf

  • @arntodd2322
    @arntodd2322 Před rokem

    For me is just commando or flare😉

  • @yungfemo6614
    @yungfemo6614 Před 2 lety

    Please can I get the link of the Rumble app by HD Moore ASAP
    And also for me to get into cybersecurity at what least age should I start preparing

  • @vishalshakya7033
    @vishalshakya7033 Před 3 lety +1

    i wanna start my own cyber security channel any advice ? sir

    • @Cyberspatial
      @Cyberspatial  Před 3 lety +2

      Produce content that you want to watch but can't find.

  • @jprince2453
    @jprince2453 Před 3 lety +1

    Question where should i start

    • @thorchris7353
      @thorchris7353 Před 3 lety +1

      First understand the operating system windows,linux,macos. I mean how they work. and learn this program PowerShell, python because this two languages are used in hacking and defence. I am a security analyst in Google.

    • @jprince2453
      @jprince2453 Před 3 lety

      @@thorchris7353 linux user never know window can be user in this field

    • @thorchris7353
      @thorchris7353 Před 3 lety

      Iit is not about using. I understand what are you saying. you know what is the base language for windows

    • @jprince2453
      @jprince2453 Před 3 lety

      @@thorchris7353 yeah the c family and linux is mostly python or go or javascript base before i which to cyber field i was into python ai on c++ games

    • @Cyberspatial
      @Cyberspatial  Před 3 lety +1

      Start by reading books on computer and network security

  • @tylercoombs1
    @tylercoombs1 Před 3 lety

    Facebook is very sketchy! I'm curious why you would recommend a harvesting tool made by them?

    • @Cyberspatial
      @Cyberspatial  Před 3 lety +4

      Facebook as an advertising and social media company is a bit different than the team running their security operations and open-sourcing internal projects.

    • @tylercoombs1
      @tylercoombs1 Před 3 lety

      @@Cyberspatial That makes sense, thank you!

  • @lovelydarlinghari
    @lovelydarlinghari Před 3 lety

    Hi bro I need a small help please

  • @Jupiterxice
    @Jupiterxice Před 3 lety

    Dont for get about making passwords complex and complicated to crack.

    • @Cyberspatial
      @Cyberspatial  Před 3 lety

      Probably some kind of multi-factor is better in a remote enterprise environment.

  • @stementhusiast816
    @stementhusiast816 Před 2 lety

    I have a feeling the keyword in the title may have reduced this video's exposure to potential viewers. Curious.

  • @troyfred2562
    @troyfred2562 Před 2 lety

    Government networks secure? *explodes in laughter*. Cooperate models are far and away better than most Gov nets.

  • @only_boi1831
    @only_boi1831 Před 3 lety

    i see its not just cybersecurity you know. what? did u study Biology too? LOL!

    • @Cyberspatial
      @Cyberspatial  Před 3 lety +3

      I have learned some biology before. Having as many mental models as you can is super useful!

  • @felixchua-wz7ge
    @felixchua-wz7ge Před 3 lety

    I have noticed that when you talk, you sometimes don't take long enough breaths/have a long enough pause to breath long enough so you run out of oxygen and have to speak fast, pronounce words a bit strange, etc. Now I am not saying that I can do this talking thing as good as you, but I have seen how the good CZcamsrs do it so this is just some constructive criticism from a random person on the internet.