Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Ordell Robbie, Tripwire and Security Configuration Management.
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach

Ordell Robbie, Tripwire and Security Configuration Management.

5 years ago Mitch Parker
Ordell Robbie, Tripwire and Security Configuration Management.

ORDELL: Take the keys, man. Listen to music.

LOUIS: Which one is for the car?

(Ordell finds it. While he goes through the keys, Vicki comes back on the line.)

(Max speaks with her as he fills out his papers.)

ORDELL: (holding a key)

This one’s for the ignition…

(holding a little black box)

… but you gotta hit this thing to shut the alarm off and unlock the door.

LOUIS: What do I do?

ORDELL: You ain’t got to do nothing. Just point at it and push the button. You’ll hear the car go “bleep.” That means the alarm’s off and the doors are open.

LOUIS: Okay.

ORDELL: Now play the volume as loud as you want but don’t touch my levels. I got them set just the way I want ’em.

(Louis nods and goes out.)

End Scene


Is this Jackie Brown or is it Tripwire?

The reality is, it’s both. This is a powerful scene in Jackie Brown because it illustrates what Tripwire is all about in making sure that a golden image can be maintained via secure configuration management.

But how would you know if it was changed?

Introducing secure configuration management

The National Institute of Standards and Technology (NIST) in SP 800-128, defines security configuration management (SCM) as “The management and control of configurations for an information system to enable security and facilitate the management of risk.”

Assailants look for systems that have default locales that are susceptible. Once an attacker manipulates a structure, they start making changes.

SCM can help prevent this type of malicious activity. It can do so by not only detecting misconfigurations that make your practices susceptible but also by identifying “uncommon” changes to important files or registry keys.

This is why Ordell didn’t want Louis touching his dials…but how can he know for sure?

With new zero-day threats revealed almost daily, signature-based defenses are just not enough to detect sophisticated and advanced threats.

To detect a fissure at its inception, organizations need to not just understand what is changing on critical devices but also be able to identify “unwanted” modifications.

SCM tools allow companies to recognize exactly what is changing on their crucial resources “in time.”

Tripwire is able to do this by:

  • Setting policy – Identifying which files on which devices need to be monitored.
  • Baselining files – Ensures the files you assess are in a known good state.
  • Monitoring and reconciling changes – You can see hundreds of file changes on a normal day on a single system. Knowing a good change from a bad one is essential.
  • Alerting – When unauthorized changes are detected, focusing on the highest priority alerts and taking corrective action before more damage is done.
  • Reporting – FIM is required for several areas of compliance and most other standards. Clear reports with the ability to drill-down are important both for operational processes and audit compliance.

SCM in a Nutshell

By setting a gold standard configuration for your systems and continuously monitoring for indicators of compromise, organizations can quickly identify a breach.

Early detection of a breach helps to mitigate the damages of an attack or multiple attacks.

Using SCM to implement a corporate hardening standard like CIS, NIST and ISO 27001 or a compliance standard like PCI, SOX or HIPAA provides the ability to continuously harden systems to reduce the attack surface.

And hardened systems, i.e. a secure baseline, provides more assurance against the bad guys to launch a successful attack.

With Tripwire, if those dials were changed, Ordell would have known sooner and would be able to take action on those changes in a positive way.

The post ” Ordell Robbie, Tripwire and Security Configuration Management.” appeared first on TripWire

Source:TripWire – Mitch Parker

Tags: Compliance, Critical Severity, Encryption, Goverment, TripWire

Continue Reading

Previous 5 Lessons Learnt from BJJ that Are Applicable to Cybersecurity
Next WARNING: Google Discloses Windows Zero-Day Bug Exploited in the Wild

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with Them

2 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware

3 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper

5 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems

8 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

2 days ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

2 days ago [email protected] (The Hacker News)

Recent Posts

  • We Found Eight Attack Vectors Inside AWS Bedrock. Here’s What Attackers Can Do with Them
  • Microsoft Warns IRS Phishing Hits 29,000 Users, Deploys RMM Malware
  • Trivy Hack Spreads Infostealer via Docker, Triggers Worm and Kubernetes Wiper
  • Hackers Exploit CVE-2025-32975 (CVSS 10.0) to Hijack Unpatched Quest KACE SMA Systems
  • FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT