1.

Record Nr.

UNINA9910786672303321

Autore

Ablon Lillian

Titolo

Markets for Cybercrime Tools and Stolen Data [[electronic resource] ] : Hackers'' Bazaar

Pubbl/distr/stampa

Santa Monica, : RAND Corporation, 2014

ISBN

0-8330-8541-7

Descrizione fisica

1 online resource (83 p.)

Altri autori (Persone)

LibickiMartin C

GolayAndrea A

Disciplina

364.168

Soggetti

Computer crimes -- Economic aspects

Computer crimes

Cyberterrorism

Social Welfare & Social Work

Social Sciences

Criminology, Penology & Juvenile Delinquency

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di contenuto

Title Page; Copyright; Preface; Contents; Figures and Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction and Research Methodology; Chapter Two: Characteristics of the Black Market; Structure; Participants; Business Conduits; Language; Products; Pricing; Reliability and Integrity; Sensitivity to External Events; Resilience; Chapter Three: The Black Market and Botnets; Sophistication; Cost Trends Over Time; Chapter Four: Zero-Day Vulnerabilities in the Black and Gray Markets; Participants and Structure; Prices; Trends for the Zero-Day Market

Chapter Five: Are Hacker Black Markets Mature?Chapter Six: Projections and Predictions for the Black Market; Most-Agreed-Upon Projections and Predictions; Agreed-Upon Projections and Predictions for Shifts in Targets; Agreed-Upon Projections and Predictions for Shifts in Attack Characteristics; Agreed-Upon Projections and Predictions for Shifts in Participants; Contested Projections and Predictions; Chapter Seven: Conclusions; Chapter Eight: For Future Research; Appendixes; A. Text of the Black Market Timeline; B. Glossary; Bibliography; Selected



Interviews and Personal Communications

Sommario/riassunto

Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.