combating "smash and grab" hacking with tripwire cybercrime controls
DESCRIPTION
The headlines are full of dazzling breaches that took long-term planning, persistence and hacking genius to execute. But the reality is that most breaches required only average knowledge and an under-protected target to pull off. It’s the cyber equivalent of a smash-and-grab burglary – a purse is left on a seat, a window is smashed, the burglar runs off with the purse – that exploits weak defenses and “targets of opportunity.” Learn how Tripwire’s easily-implemented Cybercrime Controls reduce attack surface, harden systems, and immediately detect many common cyber-attacks.TRANSCRIPT
![Page 1: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/1.jpg)
Combating
“Smash & Grab”
Hacking
![Page 2: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/2.jpg)
![Page 3: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/3.jpg)
![Page 4: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/4.jpg)
![Page 5: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/5.jpg)
![Page 6: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/6.jpg)
![Page 7: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/7.jpg)
![Page 8: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/8.jpg)
• Global marketing
• Product training
• Analyst and press
• Customer programs
• Product / Mktg Liaison
• System integrations
• Custom solutions
• New technologies
• Proof of concepts
• Analyst demos
![Page 9: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/9.jpg)
• Personally identifiable information
• Social Security #s
• Intellectual Property
• Credit Card #s
• IP addresses
• Server names & configurations
• Email address
• Medical history
• Employment records
• Criminal records
Maintain Long-term Access to
Compromised Systems:
“Staying In”
CauseDamage:“Acting”
Initial Compromise:“Getting In”
![Page 10: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/10.jpg)
• Personally identifiable information
• Social Security #s
• Intellectual Property
• Credit Card #s
• IP addresses
• Server names & configurations
• Email address
• Medical history
• Employment records
• Criminal records
![Page 11: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/11.jpg)
• Personally identifiable information
• Social Security #s
• Intellectual Property
• Credit Card #s
• IP addresses
• Server names & configurations
• Email address
• Medical history
• Employment records
• Criminal records
80% of organizations have been breachedPonemon Research June 2011
![Page 12: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/12.jpg)
• Personally identifiable information
• Social Security #s
• Intellectual Property
• Credit Card #s
• IP addresses
• Server names & configurations
• Email address
• Medical history
• Employment records
• Criminal records
80% of organizations have been breachedPonemon Research June 2011
$171 Million
$4 Billion
$66 Million
1.3 Million
Customers
[National Security
Implications]
![Page 13: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/13.jpg)
80% of organizations have been breachedPonemon Research June 2011
![Page 14: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/14.jpg)
![Page 15: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/15.jpg)
![Page 16: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/16.jpg)
230% increase in cyber attacks against small companies Verizon Research June 2011
![Page 17: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/17.jpg)
230% increase in cyber attacks against small companies Verizon Research June 2011
• These attacks leverage
automated tools
• They probe dozens of
vulnerabilities in seconds
• Unlike APTs they’re
interested in targets of
opportunity
• It’s a volume business
![Page 18: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/18.jpg)
![Page 19: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/19.jpg)
![Page 20: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/20.jpg)
![Page 21: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/21.jpg)
![Page 22: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/22.jpg)
PROTECT CORRECTDETECT
![Page 23: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/23.jpg)
• Prevent breaches through
proactive configuration
assessment
• Prevent weaknesses in
the systems that store
sensitive data
• Prevent audit failures by
aligning configs to
standards
PROTECT CORRECTDETECT
![Page 24: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/24.jpg)
• Prevent breaches through
proactive configuration
assessment
• Prevent weaknesses in
the systems that store
sensitive data
• Prevent audit failures by
aligning configs to
standards
• Instantly detect deviations
from preferred states of
configurations
• Maintain constant
vigilance over key files
and data
• Gain immediate visibility
across infrastructure
PROTECT CORRECTDETECT
![Page 25: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/25.jpg)
PROTECT CORRECTDETECT
![Page 26: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/26.jpg)
•
•
•
•
• no
changes take place
![Page 27: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/27.jpg)
100 CIS tests per covered platform
•
•
•
•
•
•
![Page 28: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/28.jpg)
100 CIS tests per covered platform
•
•
•
•
•
•
Breach Detection
•
•
•
•
![Page 29: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/29.jpg)
![Page 30: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/30.jpg)
![Page 31: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/31.jpg)
Easy to import, install, activate and tune
Provides a base level of both preventive & detective controls
Ongoing updates will leverage this content across products
Available to all Tripwire Enterprise users though TCC
![Page 32: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/32.jpg)
![Page 33: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/33.jpg)
![Page 34: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/34.jpg)
![Page 35: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/35.jpg)
![Page 36: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/36.jpg)
Compliance Policy
Manager hardens
systems based
on proven standards
to prevent intrusion
File Integrity
Manager
immediately detects
changes to
known and trusted,
hardened and
secure states
Remediation
Manager
automatically
realigns and repairs
security settings using
permission-based
workflows
![Page 37: Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls](https://reader034.vdocuments.site/reader034/viewer/2022051617/559dfc141a28ab61098b4577/html5/thumbnails/37.jpg)
Tripwire is a leading global provider of
IT security and compliance automation
solutions that enable organizations to
protect, control and audit their entire IT
infrastructure
Change, Breaches, Audits
and Outages Happen. TAKE CONTROL.
THANKS FROM TRIPWIRE