LEADER 04032nam 22008293u 450 001 9910220128403321 005 20240617065428.0 010 $a9780833085740 010 $a0833085743 035 $a(CKB)2560000000149922 035 $a(EBL)1666288 035 $a(OCoLC)880459501 035 $a(SSID)ssj0001580515 035 $a(PQKBManifestationID)16257704 035 $a(PQKBTitleCode)TC0001580515 035 $a(PQKBWorkID)14861598 035 $a(PQKB)10126163 035 $a(MiAaPQ)EBC3423083 035 $a(Au-PeEL)EBL3423083 035 $a(oapen)doab115309 035 $a(EXLCZ)992560000000149922 100 $a20141006d2014|||| u|| | 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aMarkets for Cybercrime Tools and Stolen Data $eHackers'' Bazaar 205 $a1st ed. 210 $aSanta Monica $cRAND Corporation$d2014 215 $a1 online resource (83 p.) 300 $aDescription based upon print version of record. 311 08$a9780833087119 311 08$a0833087118 327 $aTitle Page; Copyright; Preface; Contents; Figures and Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction and Research Methodology; Chapter Two: Characteristics of the Black Market; Structure; Participants; Business Conduits; Language; Products; Pricing; Reliability and Integrity; Sensitivity to External Events; Resilience; Chapter Three: The Black Market and Botnets; Sophistication; Cost Trends Over Time; Chapter Four: Zero-Day Vulnerabilities in the Black and Gray Markets; Participants and Structure; Prices; Trends for the Zero-Day Market 327 $aChapter Five: Are Hacker Black Markets Mature?Chapter Six: Projections and Predictions for the Black Market; Most-Agreed-Upon Projections and Predictions; Agreed-Upon Projections and Predictions for Shifts in Targets; Agreed-Upon Projections and Predictions for Shifts in Attack Characteristics; Agreed-Upon Projections and Predictions for Shifts in Participants; Contested Projections and Predictions; Chapter Seven: Conclusions; Chapter Eight: For Future Research; Appendixes; A. Text of the Black Market Timeline; B. Glossary; Bibliography; Selected Interviews and Personal Communications 330 $aCriminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence. 606 $aComputer crimes -- Economic aspects 606 $aComputer crimes 606 $aCyberterrorism 606 $aComputer crimes$xEconomic aspects 606 $aBlack market 606 $aData protection 606 $aHacking 606 $aCriminology, Penology & Juvenile Delinquency$2HILCC 606 $aSocial Welfare & Social Work$2HILCC 606 $aSocial Sciences$2HILCC 615 4$aComputer crimes -- Economic aspects. 615 4$aComputer crimes. 615 4$aCyberterrorism. 615 0$aComputer crimes$xEconomic aspects. 615 0$aBlack market. 615 0$aData protection. 615 0$aHacking. 615 7$aCriminology, Penology & Juvenile Delinquency 615 7$aSocial Welfare & Social Work 615 7$aSocial Sciences 676 $a364.168 700 $aAblon$b Lillian$01161273 701 $aLibicki$b Martin C$0877014 701 $aGolay$b Andrea A$01181277 712 02$aAcquisition and Technology Policy Center 712 02$aRand Corporation 712 02$aJuniper Networks, Inc 712 02$aRand Corporation National Security Research Division, 801 0$bAU-PeEL 801 1$bAU-PeEL 801 2$bAU-PeEL 906 $aBOOK 912 $a9910220128403321 996 $aMarkets for Cybercrime Tools and Stolen Data$92741559 997 $aUNINA