Cargando…

Markets for cybercrime tools and stolen data : hackers' bazaar /

Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these mark...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Ablon, Lillian (Autor), Libicki, Martin C. (Autor), Abler, Andrea M. (Autor)
Autores Corporativos: Acquisition and Technology Policy Center (Investigador), Juniper Networks, Inc (sponsoring body.), Rand Corporation. National Security Research Division (sponsoring body.)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Santa Monica, California ; Washington, District of Columbia : RAND Corporation, [2014]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 JSTOR_ocn880459501
003 OCoLC
005 20231005004200.0
006 m o d
007 cr cnu---unuuu
008 140426t20142014caua ob 000 0 eng d
040 |a E7B  |b eng  |e rda  |e pn  |c E7B  |d EBLCP  |d COO  |d OCLCO  |d TEFOD  |d JSTOR  |d OCLCQ  |d N$T  |d CUI  |d DID  |d B24X7  |d TEFOD  |d YDXCP  |d TEFOD  |d OCLCQ  |d OCLCO  |d TEFOD  |d MYG  |d AGLDB  |d MOR  |d CCO  |d PIFAG  |d ZCU  |d MERUC  |d OCLCQ  |d JBG  |d LND  |d OCLCO  |d VFL  |d U3W  |d LOA  |d STF  |d OCLCF  |d VNS  |d VTS  |d ICN  |d CEF  |d NRAMU  |d ICG  |d OCLCQ  |d OCLCO  |d INT  |d VT2  |d EZ9  |d YDX  |d AU@  |d OCLCQ  |d ERL  |d OCLCQ  |d OCLCO  |d OCLCA  |d CUY  |d TKN  |d OCLCQ  |d OCLCO  |d TXR  |d DKC  |d OCLCQ  |d M8D  |d OCLCA  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 875174917  |a 959031460  |a 961619760  |a 962636077  |a 1044529334  |a 1060878609  |a 1075440594  |a 1124362337 
020 |a 9780124158177  |q (electronic bk.) 
020 |a 012415817X  |q (electronic bk.) 
020 |a 9780833085412  |q (electronic bk.) 
020 |a 0833085417  |q (electronic bk.) 
020 |a 9780833085740  |q (electronic bk.) 
020 |a 0833085743  |q (electronic bk.) 
020 |z 9780833087119 
020 |z 0833087118 
029 1 |a AU@  |b 000054658906 
029 1 |a DEBBG  |b BV043038232 
029 1 |a DEBBG  |b BV043608701 
029 1 |a DEBSZ  |b 42995557X 
029 1 |a GBVCP  |b 1008661708 
029 1 |a NZ1  |b 15591200 
035 |a (OCoLC)880459501  |z (OCoLC)875174917  |z (OCoLC)959031460  |z (OCoLC)961619760  |z (OCoLC)962636077  |z (OCoLC)1044529334  |z (OCoLC)1060878609  |z (OCoLC)1075440594  |z (OCoLC)1124362337 
037 |a 22573/ctt5xs7w3  |b JSTOR 
037 |a 02ED5D63-36A2-4487-A3A0-9019B215CCB8  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a HV6773  |b .A25 2014eb 
072 7 |a COM060040  |2 bisacsh 
072 7 |a MED051000  |2 bisacsh 
072 7 |a COM015000  |2 bisacsh 
072 7 |a SOC  |x 004000  |2 bisacsh 
082 0 4 |a 364.168  |2 23 
088 |a RR-610-JNI 
049 |a UAMI 
100 1 |a Ablon, Lillian,  |e author. 
245 1 0 |a Markets for cybercrime tools and stolen data :  |b hackers' bazaar /  |c Lillian Ablon, Martin C. Libicki, Andrea A. Golay. 
264 1 |a Santa Monica, California ;  |a Washington, District of Columbia :  |b RAND Corporation,  |c [2014] 
264 4 |c ©2014 
300 |a 1 online resource (xv, 65 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
347 |b PDF 
500 |a "RR-610-JNI."--Page 4 of cover 
500 |a "The research described in this report was sponsored by Juniper Networks and conducted within the Acquisition and Technology Policy Center of the RAND National Security Research Division"--Title page verso 
504 |a Includes bibliographical references (pages 53-65). 
588 0 |a Online resource; title from PDF title page (ebrary, viewed April 22, 2014). 
505 0 |a Introduction and research methodology -- Characteristics of the black market -- The black market and botnets -- Zero-day vulnerabilities in the black and gray markets -- Are hacker black markets mature? -- Projections and predictions for the black market -- Conclusions -- For future research -- Appendix A: Text of the black market timeline -- Appendix B: Glossary. 
520 |a Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks) 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Open Access 
600 1 7 |a Grässe, ...  |2 gnd 
650 0 |a Computer crimes  |x Economic aspects. 
650 0 |a Black market. 
650 0 |a Data protection. 
650 0 |a Hacking. 
650 6 |a Criminalité informatique  |x Aspect économique. 
650 6 |a Marché noir. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Piratage informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a SOCIAL SCIENCE  |x Criminology.  |2 bisacsh 
650 7 |a Black market  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Hacking  |2 fast 
650 7 |a Schwarzmarkt  |2 gnd 
650 7 |a Datensicherung  |2 gnd 
650 7 |a Internetkriminalität  |2 gnd 
650 7 |a Computerkriminalität  |2 gnd 
700 1 |a Libicki, Martin C.,  |e author. 
700 1 |a Abler, Andrea M.,  |e author. 
710 2 |a Rand Corporation,  |e issuing body. 
710 2 |a Acquisition and Technology Policy Center,  |e researcher. 
710 2 |a Juniper Networks, Inc.,  |e sponsoring body. 
710 2 |a Rand Corporation.  |b National Security Research Division,  |e sponsoring body. 
776 0 8 |i Print version:  |a Ablon, Lillian.  |t Markets for cybercrime tools and stolen data.  |d Santa Monica, CA : RAND Corporation, [2014]  |z 0833087118  |w (OCoLC)882601949 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.7249/j.ctt6wq7z6  |z Texto completo 
938 |a Books 24x7  |b B247  |n bkg00064179 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1666288 
938 |a ebrary  |b EBRY  |n ebr10858286 
938 |a EBSCOhost  |b EBSC  |n 755898 
938 |a YBP Library Services  |b YANK  |n 11775162 
938 |a YBP Library Services  |b YANK  |n 11835043 
994 |a 92  |b IZTAP