Markets for Cybercrime Tools and Stolen Data : Hackers'' Bazaar

Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2014
Language:English
Physical Description:1 online resource (83 p.)
Notes:Description based upon print version of record.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993628569104498
ctrlnum (CKB)2560000000149922
(EBL)1666288
(OCoLC)880459501
(SSID)ssj0001580515
(PQKBManifestationID)16257704
(PQKBTitleCode)TC0001580515
(PQKBWorkID)14861598
(PQKB)10126163
(MiAaPQ)EBC3423083
(Au-PeEL)EBL3423083
(EXLCZ)992560000000149922
collection bib_alma
record_format marc
spelling Ablon, Lillian.
Markets for Cybercrime Tools and Stolen Data [electronic resource] : Hackers'' Bazaar
Santa Monica : RAND Corporation, 2014.
1 online resource (83 p.)
text txt
computer c
online resource cr
Description based upon print version of record.
Title Page; Copyright; Preface; Contents; Figures and Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction and Research Methodology; Chapter Two: Characteristics of the Black Market; Structure; Participants; Business Conduits; Language; Products; Pricing; Reliability and Integrity; Sensitivity to External Events; Resilience; Chapter Three: The Black Market and Botnets; Sophistication; Cost Trends Over Time; Chapter Four: Zero-Day Vulnerabilities in the Black and Gray Markets; Participants and Structure; Prices; Trends for the Zero-Day Market
Chapter Five: Are Hacker Black Markets Mature?Chapter Six: Projections and Predictions for the Black Market; Most-Agreed-Upon Projections and Predictions; Agreed-Upon Projections and Predictions for Shifts in Targets; Agreed-Upon Projections and Predictions for Shifts in Attack Characteristics; Agreed-Upon Projections and Predictions for Shifts in Participants; Contested Projections and Predictions; Chapter Seven: Conclusions; Chapter Eight: For Future Research; Appendixes; A. Text of the Black Market Timeline; B. Glossary; Bibliography; Selected Interviews and Personal Communications
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.
English
Description based on publisher supplied metadata and other sources.
Computer crimes -- Economic aspects.
Computer crimes.
Cyberterrorism.
Computer crimes Economic aspects
Black market
Data protection
Hacking
Criminology, Penology & Juvenile Delinquency HILCC
Social Welfare & Social Work HILCC
Social Sciences HILCC
Libicki, Martin C.
Golay, Andrea A.
Acquisition and Technology Policy Center Content Provider
Rand Corporation Content Provider
Juniper Networks, Inc Content Provider
Rand Corporation National Security Research Division, Content Provider
0-8330-8711-8
language English
format Electronic
eBook
author Ablon, Lillian.
spellingShingle Ablon, Lillian.
Markets for Cybercrime Tools and Stolen Data Hackers'' Bazaar
Title Page; Copyright; Preface; Contents; Figures and Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction and Research Methodology; Chapter Two: Characteristics of the Black Market; Structure; Participants; Business Conduits; Language; Products; Pricing; Reliability and Integrity; Sensitivity to External Events; Resilience; Chapter Three: The Black Market and Botnets; Sophistication; Cost Trends Over Time; Chapter Four: Zero-Day Vulnerabilities in the Black and Gray Markets; Participants and Structure; Prices; Trends for the Zero-Day Market
Chapter Five: Are Hacker Black Markets Mature?Chapter Six: Projections and Predictions for the Black Market; Most-Agreed-Upon Projections and Predictions; Agreed-Upon Projections and Predictions for Shifts in Targets; Agreed-Upon Projections and Predictions for Shifts in Attack Characteristics; Agreed-Upon Projections and Predictions for Shifts in Participants; Contested Projections and Predictions; Chapter Seven: Conclusions; Chapter Eight: For Future Research; Appendixes; A. Text of the Black Market Timeline; B. Glossary; Bibliography; Selected Interviews and Personal Communications
author_facet Ablon, Lillian.
Libicki, Martin C.
Golay, Andrea A.
Acquisition and Technology Policy Center
Rand Corporation
Juniper Networks, Inc
Rand Corporation National Security Research Division,
Acquisition and Technology Policy Center
Rand Corporation
Juniper Networks, Inc
Rand Corporation National Security Research Division,
author_variant l a la
author2 Libicki, Martin C.
Golay, Andrea A.
Acquisition and Technology Policy Center
Rand Corporation
Juniper Networks, Inc
Rand Corporation National Security Research Division,
author2_variant m c l mc mcl
a a g aa aag
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
author_corporate Acquisition and Technology Policy Center
Rand Corporation
Juniper Networks, Inc
Rand Corporation National Security Research Division,
author_sort Ablon, Lillian.
title Markets for Cybercrime Tools and Stolen Data Hackers'' Bazaar
title_sub Hackers'' Bazaar
title_full Markets for Cybercrime Tools and Stolen Data [electronic resource] : Hackers'' Bazaar
title_fullStr Markets for Cybercrime Tools and Stolen Data [electronic resource] : Hackers'' Bazaar
title_full_unstemmed Markets for Cybercrime Tools and Stolen Data [electronic resource] : Hackers'' Bazaar
title_auth Markets for Cybercrime Tools and Stolen Data Hackers'' Bazaar
title_new Markets for Cybercrime Tools and Stolen Data
title_sort markets for cybercrime tools and stolen data hackers'' bazaar
publisher RAND Corporation,
publishDate 2014
physical 1 online resource (83 p.)
contents Title Page; Copyright; Preface; Contents; Figures and Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction and Research Methodology; Chapter Two: Characteristics of the Black Market; Structure; Participants; Business Conduits; Language; Products; Pricing; Reliability and Integrity; Sensitivity to External Events; Resilience; Chapter Three: The Black Market and Botnets; Sophistication; Cost Trends Over Time; Chapter Four: Zero-Day Vulnerabilities in the Black and Gray Markets; Participants and Structure; Prices; Trends for the Zero-Day Market
Chapter Five: Are Hacker Black Markets Mature?Chapter Six: Projections and Predictions for the Black Market; Most-Agreed-Upon Projections and Predictions; Agreed-Upon Projections and Predictions for Shifts in Targets; Agreed-Upon Projections and Predictions for Shifts in Attack Characteristics; Agreed-Upon Projections and Predictions for Shifts in Participants; Contested Projections and Predictions; Chapter Seven: Conclusions; Chapter Eight: For Future Research; Appendixes; A. Text of the Black Market Timeline; B. Glossary; Bibliography; Selected Interviews and Personal Communications
isbn 0-8330-8574-3
0-8330-8711-8
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
callnumber-label HV6773
callnumber-sort HV 46773 A7237 42014
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 360 - Social problems & social services
dewey-ones 364 - Criminology
dewey-full 364.168
dewey-sort 3364.168
dewey-raw 364.168
dewey-search 364.168
oclc_num 880459501
work_keys_str_mv AT ablonlillian marketsforcybercrimetoolsandstolendatahackersbazaar
AT libickimartinc marketsforcybercrimetoolsandstolendatahackersbazaar
AT golayandreaa marketsforcybercrimetoolsandstolendatahackersbazaar
AT acquisitionandtechnologypolicycenter marketsforcybercrimetoolsandstolendatahackersbazaar
AT randcorporation marketsforcybercrimetoolsandstolendatahackersbazaar
AT junipernetworksinc marketsforcybercrimetoolsandstolendatahackersbazaar
AT randcorporationnationalsecurityresearchdivision marketsforcybercrimetoolsandstolendatahackersbazaar
status_str n
ids_txt_mv (CKB)2560000000149922
(EBL)1666288
(OCoLC)880459501
(SSID)ssj0001580515
(PQKBManifestationID)16257704
(PQKBTitleCode)TC0001580515
(PQKBWorkID)14861598
(PQKB)10126163
(MiAaPQ)EBC3423083
(Au-PeEL)EBL3423083
(EXLCZ)992560000000149922
carrierType_str_mv cr
is_hierarchy_title Markets for Cybercrime Tools and Stolen Data Hackers'' Bazaar
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1796653694822907904
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03644nam a22006493u 4500</leader><controlfield tag="001">993628569104498</controlfield><controlfield tag="005">20230126204618.0</controlfield><controlfield tag="006">m d </controlfield><controlfield tag="007">cr -n---------</controlfield><controlfield tag="008">141006s2014||||||| s|||||||||||eng|d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-8574-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)2560000000149922</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)1666288</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)880459501</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0001580515</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)16257704</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0001580515</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)14861598</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10126163</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC3423083</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL3423083</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)992560000000149922</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">AU-PeEL</subfield><subfield code="b">eng</subfield><subfield code="c">AU-PeEL</subfield><subfield code="d">AU-PeEL</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773 .A7237 2014</subfield></datafield><datafield tag="082" ind1="0" ind2="0"><subfield code="a">364.168</subfield></datafield><datafield tag="088" ind1=" " ind2=" "><subfield code="a">RR-610-JNI</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ablon, Lillian.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Markets for Cybercrime Tools and Stolen Data</subfield><subfield code="h">[electronic resource] :</subfield><subfield code="b">Hackers'' Bazaar</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica :</subfield><subfield code="b">RAND Corporation,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (83 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Title Page; Copyright; Preface; Contents; Figures and Tables; Summary; Acknowledgments; Abbreviations; Chapter One: Introduction and Research Methodology; Chapter Two: Characteristics of the Black Market; Structure; Participants; Business Conduits; Language; Products; Pricing; Reliability and Integrity; Sensitivity to External Events; Resilience; Chapter Three: The Black Market and Botnets; Sophistication; Cost Trends Over Time; Chapter Four: Zero-Day Vulnerabilities in the Black and Gray Markets; Participants and Structure; Prices; Trends for the Zero-Day Market</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter Five: Are Hacker Black Markets Mature?Chapter Six: Projections and Predictions for the Black Market; Most-Agreed-Upon Projections and Predictions; Agreed-Upon Projections and Predictions for Shifts in Targets; Agreed-Upon Projections and Predictions for Shifts in Attack Characteristics; Agreed-Upon Projections and Predictions for Shifts in Participants; Contested Projections and Predictions; Chapter Seven: Conclusions; Chapter Eight: For Future Research; Appendixes; A. Text of the Black Market Timeline; B. Glossary; Bibliography; Selected Interviews and Personal Communications</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes -- Economic aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Black market</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Criminology, Penology &amp; Juvenile Delinquency</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Social Welfare &amp; Social Work</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Social Sciences</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Golay, Andrea A.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Acquisition and Technology Policy Center</subfield><subfield code="e">Content Provider</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation</subfield><subfield code="e">Content Provider</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Juniper Networks, Inc</subfield><subfield code="e">Content Provider</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation National Security Research Division,</subfield><subfield code="e">Content Provider</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-8711-8</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-10-30 03:51:07 Europe/Vienna</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2014-05-03 20:46:25 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5350489820004498&amp;Force_direct=true</subfield><subfield code="Z">5350489820004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350489820004498</subfield></datafield></record></collection>