37
Combating “Smash & Grab” Hacking

Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

Embed Size (px)

DESCRIPTION

The headlines are full of dazzling breaches that took long-term planning, persistence and hacking genius to execute. But the reality is that most breaches required only average knowledge and an under-protected target to pull off. It’s the cyber equivalent of a smash-and-grab burglary – a purse is left on a seat, a window is smashed, the burglar runs off with the purse – that exploits weak defenses and “targets of opportunity.” Learn how Tripwire’s easily-implemented Cybercrime Controls reduce attack surface, harden systems, and immediately detect many common cyber-attacks.

Citation preview

Page 1: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

Combating

“Smash & Grab”

Hacking

Page 2: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 3: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 4: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 5: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 6: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 7: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 8: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

• Global marketing

• Product training

• Analyst and press

• Customer programs

• Product / Mktg Liaison

• System integrations

• Custom solutions

• New technologies

• Proof of concepts

• Analyst demos

Page 9: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

• Personally identifiable information

• Social Security #s

• Intellectual Property

• Credit Card #s

• IP addresses

• Server names & configurations

• Email address

• Medical history

• Employment records

• Criminal records

Maintain Long-term Access to

Compromised Systems:

“Staying In”

CauseDamage:“Acting”

Initial Compromise:“Getting In”

Page 10: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

• Personally identifiable information

• Social Security #s

• Intellectual Property

• Credit Card #s

• IP addresses

• Server names & configurations

• Email address

• Medical history

• Employment records

• Criminal records

Page 11: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

• Personally identifiable information

• Social Security #s

• Intellectual Property

• Credit Card #s

• IP addresses

• Server names & configurations

• Email address

• Medical history

• Employment records

• Criminal records

80% of organizations have been breachedPonemon Research June 2011

Page 12: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

• Personally identifiable information

• Social Security #s

• Intellectual Property

• Credit Card #s

• IP addresses

• Server names & configurations

• Email address

• Medical history

• Employment records

• Criminal records

80% of organizations have been breachedPonemon Research June 2011

$171 Million

$4 Billion

$66 Million

1.3 Million

Customers

[National Security

Implications]

Page 13: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

80% of organizations have been breachedPonemon Research June 2011

Page 14: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 15: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 16: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

230% increase in cyber attacks against small companies Verizon Research June 2011

Page 17: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

230% increase in cyber attacks against small companies Verizon Research June 2011

• These attacks leverage

automated tools

• They probe dozens of

vulnerabilities in seconds

• Unlike APTs they’re

interested in targets of

opportunity

• It’s a volume business

Page 18: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 19: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 20: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 21: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 22: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

PROTECT CORRECTDETECT

Page 23: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

• Prevent breaches through

proactive configuration

assessment

• Prevent weaknesses in

the systems that store

sensitive data

• Prevent audit failures by

aligning configs to

standards

PROTECT CORRECTDETECT

Page 24: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

• Prevent breaches through

proactive configuration

assessment

• Prevent weaknesses in

the systems that store

sensitive data

• Prevent audit failures by

aligning configs to

standards

• Instantly detect deviations

from preferred states of

configurations

• Maintain constant

vigilance over key files

and data

• Gain immediate visibility

across infrastructure

PROTECT CORRECTDETECT

Page 25: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

PROTECT CORRECTDETECT

Page 26: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

• no

changes take place

Page 27: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

100 CIS tests per covered platform

Page 28: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

100 CIS tests per covered platform

Breach Detection

Page 29: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 30: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 31: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

Easy to import, install, activate and tune

Provides a base level of both preventive & detective controls

Ongoing updates will leverage this content across products

Available to all Tripwire Enterprise users though TCC

Page 32: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 33: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 34: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 35: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls
Page 36: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

Compliance Policy

Manager hardens

systems based

on proven standards

to prevent intrusion

File Integrity

Manager

immediately detects

changes to

known and trusted,

hardened and

secure states

Remediation

Manager

automatically

realigns and repairs

security settings using

permission-based

workflows

Page 37: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

Tripwire is a leading global provider of

IT security and compliance automation

solutions that enable organizations to

protect, control and audit their entire IT

infrastructure

Change, Breaches, Audits

and Outages Happen. TAKE CONTROL.

THANKS FROM TRIPWIRE