04032nam 22008293u 450 991022012840332120240617065428.097808330857400833085743(CKB)2560000000149922(EBL)1666288(OCoLC)880459501(SSID)ssj0001580515(PQKBManifestationID)16257704(PQKBTitleCode)TC0001580515(PQKBWorkID)14861598(PQKB)10126163(MiAaPQ)EBC3423083(Au-PeEL)EBL3423083(oapen)doab115309(EXLCZ)99256000000014992220141006d2014|||| u|| |engur|n|---|||||txtccrMarkets for Cybercrime Tools and Stolen Data Hackers'' Bazaar1st ed.Santa Monica RAND Corporation20141 online resource (83 p.)Description based upon print version of record.9780833087119 0833087118 Title Page; Copyright; Preface; Contents; Figures and Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction and Research Methodology; Chapter Two: Characteristics of the Black Market; Structure; Participants; Business Conduits; Language; Products; Pricing; Reliability and Integrity; Sensitivity to External Events; Resilience; Chapter Three: The Black Market and Botnets; Sophistication; Cost Trends Over Time; Chapter Four: Zero-Day Vulnerabilities in the Black and Gray Markets; Participants and Structure; Prices; Trends for the Zero-Day MarketChapter Five: Are Hacker Black Markets Mature?Chapter Six: Projections and Predictions for the Black Market; Most-Agreed-Upon Projections and Predictions; Agreed-Upon Projections and Predictions for Shifts in Targets; Agreed-Upon Projections and Predictions for Shifts in Attack Characteristics; Agreed-Upon Projections and Predictions for Shifts in Participants; Contested Projections and Predictions; Chapter Seven: Conclusions; Chapter Eight: For Future Research; Appendixes; A. Text of the Black Market Timeline; B. Glossary; Bibliography; Selected Interviews and Personal CommunicationsCriminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.Computer crimes -- Economic aspectsComputer crimesCyberterrorismComputer crimesEconomic aspectsBlack marketData protectionHackingCriminology, Penology & Juvenile DelinquencyHILCCSocial Welfare & Social WorkHILCCSocial SciencesHILCCComputer crimes -- Economic aspects.Computer crimes.Cyberterrorism.Computer crimesEconomic aspects.Black market.Data protection.Hacking.Criminology, Penology & Juvenile DelinquencySocial Welfare & Social WorkSocial Sciences364.168Ablon Lillian1161273Libicki Martin C877014Golay Andrea A1181277Acquisition and Technology Policy CenterRand CorporationJuniper Networks, IncRand Corporation National Security Research Division,AU-PeELAU-PeELAU-PeELBOOK9910220128403321Markets for Cybercrime Tools and Stolen Data2741559UNINA