Markets for Cybercrime Tools and Stolen Data : Hackers'' Bazaar
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets...
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2014 |
Language: | English |
Physical Description: | 1 online resource (83 p.) |
Notes: | Description based upon print version of record. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 03644nam a22006493u 4500 | ||
---|---|---|---|
001 | 993628569104498 | ||
005 | 20230126204618.0 | ||
006 | m d | ||
007 | cr -n--------- | ||
008 | 141006s2014||||||| s|||||||||||eng|d | ||
020 | |a 0-8330-8574-3 | ||
035 | |a (CKB)2560000000149922 | ||
035 | |a (EBL)1666288 | ||
035 | |a (OCoLC)880459501 | ||
035 | |a (SSID)ssj0001580515 | ||
035 | |a (PQKBManifestationID)16257704 | ||
035 | |a (PQKBTitleCode)TC0001580515 | ||
035 | |a (PQKBWorkID)14861598 | ||
035 | |a (PQKB)10126163 | ||
035 | |a (MiAaPQ)EBC3423083 | ||
035 | |a (Au-PeEL)EBL3423083 | ||
035 | |a (EXLCZ)992560000000149922 | ||
040 | |a AU-PeEL |b eng |c AU-PeEL |d AU-PeEL | ||
041 | |a eng | ||
050 | 4 | |a HV6773 .A7237 2014 | |
082 | 0 | 0 | |a 364.168 |
088 | |a RR-610-JNI | ||
100 | 1 | |a Ablon, Lillian. | |
245 | 1 | 0 | |a Markets for Cybercrime Tools and Stolen Data |h [electronic resource] : |b Hackers'' Bazaar |
260 | |a Santa Monica : |b RAND Corporation, |c 2014. | ||
300 | |a 1 online resource (83 p.) | ||
336 | |a text |b txt | ||
337 | |a computer |b c | ||
338 | |a online resource |b cr | ||
500 | |a Description based upon print version of record. | ||
505 | 0 | |a Title Page; Copyright; Preface; Contents; Figures and Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction and Research Methodology; Chapter Two: Characteristics of the Black Market; Structure; Participants; Business Conduits; Language; Products; Pricing; Reliability and Integrity; Sensitivity to External Events; Resilience; Chapter Three: The Black Market and Botnets; Sophistication; Cost Trends Over Time; Chapter Four: Zero-Day Vulnerabilities in the Black and Gray Markets; Participants and Structure; Prices; Trends for the Zero-Day Market | |
505 | 8 | |a Chapter Five: Are Hacker Black Markets Mature?Chapter Six: Projections and Predictions for the Black Market; Most-Agreed-Upon Projections and Predictions; Agreed-Upon Projections and Predictions for Shifts in Targets; Agreed-Upon Projections and Predictions for Shifts in Attack Characteristics; Agreed-Upon Projections and Predictions for Shifts in Participants; Contested Projections and Predictions; Chapter Seven: Conclusions; Chapter Eight: For Future Research; Appendixes; A. Text of the Black Market Timeline; B. Glossary; Bibliography; Selected Interviews and Personal Communications | |
520 | |a Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence. | ||
546 | |a English | ||
588 | |a Description based on publisher supplied metadata and other sources. | ||
650 | 4 | |a Computer crimes -- Economic aspects. | |
650 | 4 | |a Computer crimes. | |
650 | 4 | |a Cyberterrorism. | |
650 | 0 | |a Computer crimes |x Economic aspects | |
650 | 0 | |a Black market | |
650 | 0 | |a Data protection | |
650 | 0 | |a Hacking | |
650 | 7 | |a Criminology, Penology & Juvenile Delinquency |2 HILCC | |
650 | 7 | |a Social Welfare & Social Work |2 HILCC | |
650 | 7 | |a Social Sciences |2 HILCC | |
700 | 1 | |a Libicki, Martin C. | |
700 | 1 | |a Golay, Andrea A. | |
710 | 2 | |a Acquisition and Technology Policy Center |e Content Provider | |
710 | 2 | |a Rand Corporation |e Content Provider | |
710 | 2 | |a Juniper Networks, Inc |e Content Provider | |
710 | 2 | |a Rand Corporation National Security Research Division, |e Content Provider | |
776 | |z 0-8330-8711-8 | ||
906 | |a BOOK | ||
ADM | |b 2023-10-30 03:51:07 Europe/Vienna |f System |c marc21 |a 2014-05-03 20:46:25 Europe/Vienna |g false | ||
AVE | |i DOAB Directory of Open Access Books |P DOAB Directory of Open Access Books |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350489820004498&Force_direct=true |Z 5350489820004498 |b Available |8 5350489820004498 |