SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Combating
“Smash & Grab”
Hacking
























•   Global marketing         •   System integrations
•   Product training         •   Custom solutions
•   Analyst and press        •   New technologies
•   Customer programs        •   Proof of concepts
•   Product / Mktg Liaison   •   Analyst demos
•   Personally identifiable information
•   Social Security #s                             Maintain Long-term
                                                       Access to
•   Intellectual Property                            Compromised
                                                       Systems:
•   Credit Card #s                                    “Staying In”

•   IP addresses
•   Server names & configurations
•   Email address                            Initial                Cause
                                          Compromise:              Damage:
•   Medical history                        “Getting In”            “Acting”

•   Employment records
•   Criminal records
•   Personally identifiable information
•   Social Security #s
•   Intellectual Property
•   Credit Card #s
•   IP addresses
•   Server names & configurations
•   Email address
•   Medical history
•   Employment records
•   Criminal records
•   Personally identifiable information
•   Social Security #s
•   Intellectual Property
•   Credit Card #s
•   IP addresses
•   Server names & configurations
•   Email address
•   Medical history
•   Employment records
•   Criminal records




      80% of organizations have been breached
                           Ponemon Research June 2011
•   Personally identifiable information                 1.3 Million
•   Social Security #s                                  Customers
•   Intellectual Property
                                                                  $66 Million
•   Credit Card #s
•   IP addresses                             $171 Million
•   Server names & configurations
                                                                [National Security
•   Email address                                                 Implications]
•   Medical history                              $4 Billion
•   Employment records
•   Criminal records




      80% of organizations have been breached
                           Ponemon Research June 2011
80% of organizations have been breached
             Ponemon Research June 2011
230% increase in cyber attacks against small companies
                    Verizon Research June 2011
• These attacks leverage
                                            automated tools

                                          • They probe dozens of
                                            vulnerabilities in seconds

                                          • Unlike APTs they’re
                                            interested in targets of
                                            opportunity

                                          • It’s a volume business




230% increase in cyber attacks against small companies
                    Verizon Research June 2011
PROTECT   DETECT   CORRECT
• Prevent breaches through
  proactive configuration
  assessment
• Prevent weaknesses in
  the systems that store
  sensitive data
• Prevent audit failures by
  aligning configs to
  standards


  PROTECT                     DETECT   CORRECT
• Prevent breaches through    • Instantly detect deviations
  proactive configuration       from preferred states of
  assessment                    configurations
• Prevent weaknesses in       • Maintain constant
  the systems that store        vigilance over key files
  sensitive data                and data
• Prevent audit failures by   • Gain immediate visibility
  aligning configs to           across infrastructure
  standards


  PROTECT                            DETECT                   CORRECT
PROTECT   DETECT   CORRECT
•


•

•

•


•                        no
    changes take place
100 CIS tests per covered platform
•
•
•
•
•
•
100 CIS tests per covered platform
•
•
•
•
•
•

     Breach Detection
•
•
•
•








Ongoing updates will leverage this content across products



Easy to import, install, activate and tune


Provides a base level of both preventive & detective controls


Available to all Tripwire Enterprise users though TCC
Compliance Policy      File Integrity        Remediation
Manager hardens        Manager               Manager
systems based          immediately detects   automatically
on proven standards    changes to            realigns and repairs
to prevent intrusion   known and trusted,    security settings using
                       hardened and          permission-based
                       secure states         workflows
THANKS FROM TRIPWIRE




Change, Breaches, Audits
   and Outages Happen.       TAKE CONTROL.

                           Tripwire is a leading global provider of
                           IT security and compliance automation
                           solutions that enable organizations to
                           protect, control and audit their entire IT
                           infrastructure

Weitere ähnliche Inhalte

Was ist angesagt?

IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM SolutionsIPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
Lacoon Mobile Security
 

Was ist angesagt? (19)

2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum 2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
 
Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015Resiliency-Part One -11-3-2015
Resiliency-Part One -11-3-2015
 
CYBER51-FYLER
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
 
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Part 1: Identifying  Insider Threats with Fidelis EDR Technology Part 1: Identifying  Insider Threats with Fidelis EDR Technology
Part 1: Identifying Insider Threats with Fidelis EDR Technology
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
Data security
Data securityData security
Data security
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Technical Challenges in Cyber Forensics
Technical Challenges in Cyber ForensicsTechnical Challenges in Cyber Forensics
Technical Challenges in Cyber Forensics
 
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM SolutionsIPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
IPExpo 2013 - Anatomy of a Targeted Attack Against MDM Solutions
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
 
IoT Security Challenges
IoT Security ChallengesIoT Security Challenges
IoT Security Challenges
 
Data Security
Data SecurityData Security
Data Security
 
Chapter 3 security principals
Chapter 3 security principalsChapter 3 security principals
Chapter 3 security principals
 
CISSP-WEB
CISSP-WEBCISSP-WEB
CISSP-WEB
 
2017 Predictions: Identity and Security
2017 Predictions: Identity and Security 2017 Predictions: Identity and Security
2017 Predictions: Identity and Security
 
Data security
Data securityData security
Data security
 
Hunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systemsHunting for cyber threats targeting weapon systems
Hunting for cyber threats targeting weapon systems
 
Information Security in the eDiscovery Process
Information Security in the eDiscovery ProcessInformation Security in the eDiscovery Process
Information Security in the eDiscovery Process
 
Tsc2021 cyber-issues
Tsc2021 cyber-issuesTsc2021 cyber-issues
Tsc2021 cyber-issues
 

Andere mochten auch

Akka smash-and-grab
Akka smash-and-grabAkka smash-and-grab
Akka smash-and-grab
Justin Long
 
What’s New in PCI DSS v2
What’s New in PCI DSS v2What’s New in PCI DSS v2
What’s New in PCI DSS v2
Tripwire
 

Andere mochten auch (11)

Akka smash-and-grab
Akka smash-and-grabAkka smash-and-grab
Akka smash-and-grab
 
Meeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity MonitoringMeeting the True Intent of File Integrity Monitoring
Meeting the True Intent of File Integrity Monitoring
 
Building a Business Case for Credentialed Vulnerability Scanning
Building a Business Case for Credentialed Vulnerability ScanningBuilding a Business Case for Credentialed Vulnerability Scanning
Building a Business Case for Credentialed Vulnerability Scanning
 
What’s New in PCI DSS v2
What’s New in PCI DSS v2What’s New in PCI DSS v2
What’s New in PCI DSS v2
 
Are You Prepared For More High-Impact Vulnerabilties?
Are You Prepared For More High-Impact Vulnerabilties?Are You Prepared For More High-Impact Vulnerabilties?
Are You Prepared For More High-Impact Vulnerabilties?
 
How to Protect Your Organization from the Ransomware Epidemic
How to Protect Your Organization from the Ransomware EpidemicHow to Protect Your Organization from the Ransomware Epidemic
How to Protect Your Organization from the Ransomware Epidemic
 
Shedding Light on Smart Grid & Cyber Security
Shedding Light on Smart Grid & Cyber SecurityShedding Light on Smart Grid & Cyber Security
Shedding Light on Smart Grid & Cyber Security
 
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and OverviewTripwire University: Cyberwar Boot Camp – Introduction and Overview
Tripwire University: Cyberwar Boot Camp – Introduction and Overview
 
Beautiful Russian/Ukraine Women [Hot Russian Women For Marriage]
Beautiful Russian/Ukraine Women [Hot Russian Women For Marriage]Beautiful Russian/Ukraine Women [Hot Russian Women For Marriage]
Beautiful Russian/Ukraine Women [Hot Russian Women For Marriage]
 
The Kurds
The KurdsThe Kurds
The Kurds
 
IRAQ - 2016 in review - Part I
IRAQ -  2016 in review - Part IIRAQ -  2016 in review - Part I
IRAQ - 2016 in review - Part I
 

Ähnlich wie Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

Ähnlich wie Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls (20)

DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
 
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
Himss 2016 Lunch & Learn: Data Security in IoT (and ePHI Risks)
 
Electronic security
Electronic securityElectronic security
Electronic security
 
Electronic Security
Electronic SecurityElectronic Security
Electronic Security
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Security for heterogeneous enviroments
Security for heterogeneous enviromentsSecurity for heterogeneous enviroments
Security for heterogeneous enviroments
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM i
 
How to Simplify Audit Compliance with Unified Security Management
How to Simplify Audit Compliance with Unified Security ManagementHow to Simplify Audit Compliance with Unified Security Management
How to Simplify Audit Compliance with Unified Security Management
 
Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2Oath appsec sf 2015 dem rev. 2
Oath appsec sf 2015 dem rev. 2
 
Strong Authentication - Open Source
Strong Authentication - Open SourceStrong Authentication - Open Source
Strong Authentication - Open Source
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Denver ISSA Chapter Meetings - Changing the Security Paradigm
Denver  ISSA Chapter Meetings - Changing the Security ParadigmDenver  ISSA Chapter Meetings - Changing the Security Paradigm
Denver ISSA Chapter Meetings - Changing the Security Paradigm
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat Intelligence
 
Security audit
Security auditSecurity audit
Security audit
 
Security Audit
Security AuditSecurity Audit
Security Audit
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
 
Pci Req
Pci ReqPci Req
Pci Req
 

Mehr von Tripwire

Mehr von Tripwire (20)

Mind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't EnoughMind the Cybersecurity Gap - Why Compliance Isn't Enough
Mind the Cybersecurity Gap - Why Compliance Isn't Enough
 
Data Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data PrivacyData Privacy Day 2022: Tips to Ensure Data Privacy
Data Privacy Day 2022: Tips to Ensure Data Privacy
 
Key Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The ExpertsKey Challenges Facing IT/OT: Hear From The Experts
Key Challenges Facing IT/OT: Hear From The Experts
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 
Tripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale PetersonTripwire Energy Working Group Session w/Dale Peterson
Tripwire Energy Working Group Session w/Dale Peterson
 
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
Tripwire Energy Working Group: CIP Solutions and Baseline Walk-Through
 
Tripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase ColeTripwire Energy Working Group: Customer Session with Chase Cole
Tripwire Energy Working Group: Customer Session with Chase Cole
 
Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller Tripwire Energy Working Group: Keynote w/Patrick Miller
Tripwire Energy Working Group: Keynote w/Patrick Miller
 
World Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest CelebrationWorld Book Day: Cybersecurity’s Quietest Celebration
World Book Day: Cybersecurity’s Quietest Celebration
 
Tripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key FindingsTripwire Retail Security 2020 Survey: Key Findings
Tripwire Retail Security 2020 Survey: Key Findings
 
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact ReportKey Findings: Tripwire COVID-19 Cybersecurity Impact Report
Key Findings: Tripwire COVID-19 Cybersecurity Impact Report
 
The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!The Adventures of Captain Tripwire: Coloring Book!
The Adventures of Captain Tripwire: Coloring Book!
 
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT CollaborationIndustrial Cybersecurity: Practical Tips for IT & OT Collaboration
Industrial Cybersecurity: Practical Tips for IT & OT Collaboration
 
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
The Adventures of Captain Tripwire #1: Captain Tripwire Faces the Indefensibl...
 
Tripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key FindingsTripwire 2019 Skills Gap Survey: Key Findings
Tripwire 2019 Skills Gap Survey: Key Findings
 
A Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber MomentsA Look Back at 2018: The Most Memorable Cyber Moments
A Look Back at 2018: The Most Memorable Cyber Moments
 
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass AuditsTime for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
Time for Your Compliance Check-Up: How Mercy Health Uses Tripwire to Pass Audits
 
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key FindingsTripwire State of Cyber Hygiene 2018 Report: Key Findings
Tripwire State of Cyber Hygiene 2018 Report: Key Findings
 
Defend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK FrameworkDefend Your Data Now with the MITRE ATT&CK Framework
Defend Your Data Now with the MITRE ATT&CK Framework
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Combating "Smash and Grab" Hacking with Tripwire Cybercrime Controls

  • 2.
  • 3.
  • 8. Global marketing • System integrations • Product training • Custom solutions • Analyst and press • New technologies • Customer programs • Proof of concepts • Product / Mktg Liaison • Analyst demos
  • 9. Personally identifiable information • Social Security #s Maintain Long-term Access to • Intellectual Property Compromised Systems: • Credit Card #s “Staying In” • IP addresses • Server names & configurations • Email address Initial Cause Compromise: Damage: • Medical history “Getting In” “Acting” • Employment records • Criminal records
  • 10. Personally identifiable information • Social Security #s • Intellectual Property • Credit Card #s • IP addresses • Server names & configurations • Email address • Medical history • Employment records • Criminal records
  • 11. Personally identifiable information • Social Security #s • Intellectual Property • Credit Card #s • IP addresses • Server names & configurations • Email address • Medical history • Employment records • Criminal records 80% of organizations have been breached Ponemon Research June 2011
  • 12. Personally identifiable information 1.3 Million • Social Security #s Customers • Intellectual Property $66 Million • Credit Card #s • IP addresses $171 Million • Server names & configurations [National Security • Email address Implications] • Medical history $4 Billion • Employment records • Criminal records 80% of organizations have been breached Ponemon Research June 2011
  • 13. 80% of organizations have been breached Ponemon Research June 2011
  • 14.
  • 15.
  • 16. 230% increase in cyber attacks against small companies Verizon Research June 2011
  • 17. • These attacks leverage automated tools • They probe dozens of vulnerabilities in seconds • Unlike APTs they’re interested in targets of opportunity • It’s a volume business 230% increase in cyber attacks against small companies Verizon Research June 2011
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. PROTECT DETECT CORRECT
  • 23. • Prevent breaches through proactive configuration assessment • Prevent weaknesses in the systems that store sensitive data • Prevent audit failures by aligning configs to standards PROTECT DETECT CORRECT
  • 24. • Prevent breaches through • Instantly detect deviations proactive configuration from preferred states of assessment configurations • Prevent weaknesses in • Maintain constant the systems that store vigilance over key files sensitive data and data • Prevent audit failures by • Gain immediate visibility aligning configs to across infrastructure standards PROTECT DETECT CORRECT
  • 25. PROTECT DETECT CORRECT
  • 26. • • • • • no changes take place
  • 27. 100 CIS tests per covered platform • • • • • •
  • 28. 100 CIS tests per covered platform • • • • • • Breach Detection • • • •
  • 29.
  • 31. Ongoing updates will leverage this content across products Easy to import, install, activate and tune Provides a base level of both preventive & detective controls Available to all Tripwire Enterprise users though TCC
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Compliance Policy File Integrity Remediation Manager hardens Manager Manager systems based immediately detects automatically on proven standards changes to realigns and repairs to prevent intrusion known and trusted, security settings using hardened and permission-based secure states workflows
  • 37. THANKS FROM TRIPWIRE Change, Breaches, Audits and Outages Happen. TAKE CONTROL. Tripwire is a leading global provider of IT security and compliance automation solutions that enable organizations to protect, control and audit their entire IT infrastructure

Hinweis der Redaktion

  1. http://www.globenewswire.com/newsroom/news.html?d=218783
  2. http://www.globenewswire.com/newsroom/news.html?d=218783
  3. http://www.globenewswire.com/newsroom/news.html?d=218783
  4. http://www.zdnet.com/blog/btl/sonys-data-breach-costs-likely-to-scream-higher/49161http://www.net-security.org/secworld.php?id=10966
  5. http://online.wsj.com/article/SB10001424052702304567604576454173706460768.html
  6. *http://www.technicalinfo.net/papers/StoppingAutomatedAttackTools.html such as Mirroring, Site Scraping/Spidering, CGI Scanning, Brute Forcing, FuzzingIn the demo of the Morto Worm you will see a classic “brute force” attack that apparently worked as well today as it would have in the 1990s.Mirroring – The attacker seeks to capture or create a comprehensive copy of the application on a server or storage device of their choosing. This mirrored image of the application content can be used for:Theft and repackaging of intellectual property.Part of a customer deception crime such as man-in-the-middle attacks, Phishing, or identity theft.Site Scraping or Spidering– The attacker’s goal is to analyse all returned data and uncover useful information within the visible and non-visible sections of the HTML or client-side scripts. Information gleaned in this process can be used for:Harvesting of email addresses for spam lists.Social engineering attacks based upon personal data (such as names, telephone numbers, email addresses, etc.)Ascertaining backend server processes and software versions or revisions.Understanding development techniques and possible code bypasses based upon “hidden” comments and notes left behind by the application developer(s).Uncovering application details that will influence future phases in the exploitation of the application (e.g. references to “hidden” URL’s, test accounts, interesting content, etc.).Mapping the structure of application URLs and content linking/referencing.CGI Scanning – The inclusion of exhaustive lists of content locations, paths and file names to uncover existing application content that could be used in later examinations or for exploitation. Typically, the information being sought includes:Likely administrative pages or directories.Scripts and controls associated with different web servers and known to be vulnerable to exploitation.Default content and sample files.Common “hidden” directories or file path locations.Shared web services or content not directly referenced by the web-based application.File download repository locations.Files commonly associated with temporary content or backup versions.Brute Forcing – Using this technique, an attacker attempts to brute force guess an important piece of data (e.g. a password or account number) to gain access to additional areas or functionality within the application. Common techniques make use of:Extensive dictionaries.Common file or directory path listings.Information gathered through site scraping, spidering and CGI scanning.Hybrid dictionaries that include the use of common obfuscation techniques such as elite-speak.Incremental iteration through all possible character combinations.Fuzzing – Closely related to brute forcing, this process involves examining each form or application submission variable for poor handling of unexpected content. In recent years, many of the most dangerous application security vulnerabilities have been discovered using this technique. Typically each application variable is tested for:Buffer overflows,Type conversion handling,Cross-site scripting,SQL injection,File and directory path navigation,Differences between client-side and server-side validation processes.