Markets for Cybercrime Tools and Stolen Data : Hackers'' Bazaar
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets...
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2014 |
Language: | English |
Physical Description: | 1 online resource (83 p.) |
Notes: | Description based upon print version of record. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993628569104498 |
---|---|
ctrlnum |
(CKB)2560000000149922 (EBL)1666288 (OCoLC)880459501 (SSID)ssj0001580515 (PQKBManifestationID)16257704 (PQKBTitleCode)TC0001580515 (PQKBWorkID)14861598 (PQKB)10126163 (MiAaPQ)EBC3423083 (Au-PeEL)EBL3423083 (EXLCZ)992560000000149922 |
collection |
bib_alma |
record_format |
marc |
spelling |
Ablon, Lillian. Markets for Cybercrime Tools and Stolen Data [electronic resource] : Hackers'' Bazaar Santa Monica : RAND Corporation, 2014. 1 online resource (83 p.) text txt computer c online resource cr Description based upon print version of record. Title Page; Copyright; Preface; Contents; Figures and Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction and Research Methodology; Chapter Two: Characteristics of the Black Market; Structure; Participants; Business Conduits; Language; Products; Pricing; Reliability and Integrity; Sensitivity to External Events; Resilience; Chapter Three: The Black Market and Botnets; Sophistication; Cost Trends Over Time; Chapter Four: Zero-Day Vulnerabilities in the Black and Gray Markets; Participants and Structure; Prices; Trends for the Zero-Day Market Chapter Five: Are Hacker Black Markets Mature?Chapter Six: Projections and Predictions for the Black Market; Most-Agreed-Upon Projections and Predictions; Agreed-Upon Projections and Predictions for Shifts in Targets; Agreed-Upon Projections and Predictions for Shifts in Attack Characteristics; Agreed-Upon Projections and Predictions for Shifts in Participants; Contested Projections and Predictions; Chapter Seven: Conclusions; Chapter Eight: For Future Research; Appendixes; A. Text of the Black Market Timeline; B. Glossary; Bibliography; Selected Interviews and Personal Communications Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence. English Description based on publisher supplied metadata and other sources. Computer crimes -- Economic aspects. Computer crimes. Cyberterrorism. Computer crimes Economic aspects Black market Data protection Hacking Criminology, Penology & Juvenile Delinquency HILCC Social Welfare & Social Work HILCC Social Sciences HILCC Libicki, Martin C. Golay, Andrea A. Acquisition and Technology Policy Center Content Provider Rand Corporation Content Provider Juniper Networks, Inc Content Provider Rand Corporation National Security Research Division, Content Provider 0-8330-8711-8 |
language |
English |
format |
Electronic eBook |
author |
Ablon, Lillian. |
spellingShingle |
Ablon, Lillian. Markets for Cybercrime Tools and Stolen Data Hackers'' Bazaar Title Page; Copyright; Preface; Contents; Figures and Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction and Research Methodology; Chapter Two: Characteristics of the Black Market; Structure; Participants; Business Conduits; Language; Products; Pricing; Reliability and Integrity; Sensitivity to External Events; Resilience; Chapter Three: The Black Market and Botnets; Sophistication; Cost Trends Over Time; Chapter Four: Zero-Day Vulnerabilities in the Black and Gray Markets; Participants and Structure; Prices; Trends for the Zero-Day Market Chapter Five: Are Hacker Black Markets Mature?Chapter Six: Projections and Predictions for the Black Market; Most-Agreed-Upon Projections and Predictions; Agreed-Upon Projections and Predictions for Shifts in Targets; Agreed-Upon Projections and Predictions for Shifts in Attack Characteristics; Agreed-Upon Projections and Predictions for Shifts in Participants; Contested Projections and Predictions; Chapter Seven: Conclusions; Chapter Eight: For Future Research; Appendixes; A. Text of the Black Market Timeline; B. Glossary; Bibliography; Selected Interviews and Personal Communications |
author_facet |
Ablon, Lillian. Libicki, Martin C. Golay, Andrea A. Acquisition and Technology Policy Center Rand Corporation Juniper Networks, Inc Rand Corporation National Security Research Division, Acquisition and Technology Policy Center Rand Corporation Juniper Networks, Inc Rand Corporation National Security Research Division, |
author_variant |
l a la |
author2 |
Libicki, Martin C. Golay, Andrea A. Acquisition and Technology Policy Center Rand Corporation Juniper Networks, Inc Rand Corporation National Security Research Division, |
author2_variant |
m c l mc mcl a a g aa aag |
author2_role |
TeilnehmendeR TeilnehmendeR TeilnehmendeR TeilnehmendeR TeilnehmendeR TeilnehmendeR |
author_corporate |
Acquisition and Technology Policy Center Rand Corporation Juniper Networks, Inc Rand Corporation National Security Research Division, |
author_sort |
Ablon, Lillian. |
title |
Markets for Cybercrime Tools and Stolen Data Hackers'' Bazaar |
title_sub |
Hackers'' Bazaar |
title_full |
Markets for Cybercrime Tools and Stolen Data [electronic resource] : Hackers'' Bazaar |
title_fullStr |
Markets for Cybercrime Tools and Stolen Data [electronic resource] : Hackers'' Bazaar |
title_full_unstemmed |
Markets for Cybercrime Tools and Stolen Data [electronic resource] : Hackers'' Bazaar |
title_auth |
Markets for Cybercrime Tools and Stolen Data Hackers'' Bazaar |
title_new |
Markets for Cybercrime Tools and Stolen Data |
title_sort |
markets for cybercrime tools and stolen data hackers'' bazaar |
publisher |
RAND Corporation, |
publishDate |
2014 |
physical |
1 online resource (83 p.) |
contents |
Title Page; Copyright; Preface; Contents; Figures and Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction and Research Methodology; Chapter Two: Characteristics of the Black Market; Structure; Participants; Business Conduits; Language; Products; Pricing; Reliability and Integrity; Sensitivity to External Events; Resilience; Chapter Three: The Black Market and Botnets; Sophistication; Cost Trends Over Time; Chapter Four: Zero-Day Vulnerabilities in the Black and Gray Markets; Participants and Structure; Prices; Trends for the Zero-Day Market Chapter Five: Are Hacker Black Markets Mature?Chapter Six: Projections and Predictions for the Black Market; Most-Agreed-Upon Projections and Predictions; Agreed-Upon Projections and Predictions for Shifts in Targets; Agreed-Upon Projections and Predictions for Shifts in Attack Characteristics; Agreed-Upon Projections and Predictions for Shifts in Participants; Contested Projections and Predictions; Chapter Seven: Conclusions; Chapter Eight: For Future Research; Appendixes; A. Text of the Black Market Timeline; B. Glossary; Bibliography; Selected Interviews and Personal Communications |
isbn |
0-8330-8574-3 0-8330-8711-8 |
callnumber-first |
H - Social Science |
callnumber-subject |
HV - Social Pathology, Criminology |
callnumber-label |
HV6773 |
callnumber-sort |
HV 46773 A7237 42014 |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
360 - Social problems & social services |
dewey-ones |
364 - Criminology |
dewey-full |
364.168 |
dewey-sort |
3364.168 |
dewey-raw |
364.168 |
dewey-search |
364.168 |
oclc_num |
880459501 |
work_keys_str_mv |
AT ablonlillian marketsforcybercrimetoolsandstolendatahackersbazaar AT libickimartinc marketsforcybercrimetoolsandstolendatahackersbazaar AT golayandreaa marketsforcybercrimetoolsandstolendatahackersbazaar AT acquisitionandtechnologypolicycenter marketsforcybercrimetoolsandstolendatahackersbazaar AT randcorporation marketsforcybercrimetoolsandstolendatahackersbazaar AT junipernetworksinc marketsforcybercrimetoolsandstolendatahackersbazaar AT randcorporationnationalsecurityresearchdivision marketsforcybercrimetoolsandstolendatahackersbazaar |
status_str |
n |
ids_txt_mv |
(CKB)2560000000149922 (EBL)1666288 (OCoLC)880459501 (SSID)ssj0001580515 (PQKBManifestationID)16257704 (PQKBTitleCode)TC0001580515 (PQKBWorkID)14861598 (PQKB)10126163 (MiAaPQ)EBC3423083 (Au-PeEL)EBL3423083 (EXLCZ)992560000000149922 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Markets for Cybercrime Tools and Stolen Data Hackers'' Bazaar |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1796653694822907904 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03644nam a22006493u 4500</leader><controlfield tag="001">993628569104498</controlfield><controlfield tag="005">20230126204618.0</controlfield><controlfield tag="006">m d </controlfield><controlfield tag="007">cr -n---------</controlfield><controlfield tag="008">141006s2014||||||| s|||||||||||eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-8574-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)2560000000149922</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)1666288</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)880459501</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0001580515</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)16257704</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0001580515</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)14861598</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10126163</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC3423083</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL3423083</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)992560000000149922</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">AU-PeEL</subfield><subfield code="b">eng</subfield><subfield code="c">AU-PeEL</subfield><subfield code="d">AU-PeEL</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773 .A7237 2014</subfield></datafield><datafield tag="082" ind1="0" ind2="0"><subfield code="a">364.168</subfield></datafield><datafield tag="088" ind1=" " ind2=" "><subfield code="a">RR-610-JNI</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ablon, Lillian.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Markets for Cybercrime Tools and Stolen Data</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">Hackers'' Bazaar</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica :</subfield><subfield code="b">RAND Corporation,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (83 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Title Page; Copyright; Preface; Contents; Figures and Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction and Research Methodology; Chapter Two: Characteristics of the Black Market; Structure; Participants; Business Conduits; Language; Products; Pricing; Reliability and Integrity; Sensitivity to External Events; Resilience; Chapter Three: The Black Market and Botnets; Sophistication; Cost Trends Over Time; Chapter Four: Zero-Day Vulnerabilities in the Black and Gray Markets; Participants and Structure; Prices; Trends for the Zero-Day Market</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter Five: Are Hacker Black Markets Mature?Chapter Six: Projections and Predictions for the Black Market; Most-Agreed-Upon Projections and Predictions; Agreed-Upon Projections and Predictions for Shifts in Targets; Agreed-Upon Projections and Predictions for Shifts in Attack Characteristics; Agreed-Upon Projections and Predictions for Shifts in Participants; Contested Projections and Predictions; Chapter Seven: Conclusions; Chapter Eight: For Future Research; Appendixes; A. Text of the Black Market Timeline; B. Glossary; Bibliography; Selected Interviews and Personal Communications</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes -- Economic aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Black market</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminology, Penology & Juvenile Delinquency</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Social Welfare & Social Work</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Social Sciences</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Golay, Andrea A.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Acquisition and Technology Policy Center</subfield><subfield code="e">Content Provider</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation</subfield><subfield code="e">Content Provider</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Juniper Networks, Inc</subfield><subfield code="e">Content Provider</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation National Security Research Division,</subfield><subfield code="e">Content Provider</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-8711-8</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-10-30 03:51:07 Europe/Vienna</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2014-05-03 20:46:25 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350489820004498&Force_direct=true</subfield><subfield code="Z">5350489820004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350489820004498</subfield></datafield></record></collection> |