Markets for cybercrime tools and stolen data : hackers' bazaar /

Saved in:
Bibliographic Details
Author / Creator:Ablon, Lillian, author.
Imprint:Santa Monica, California ; Washington, District of Columbia : RAND Corporation, [2014]
©2014
Description:1 online resource (xv, 65 pages) : illustrations
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11230122
Hidden Bibliographic Details
Other authors / contributors:Libicki, Martin C., author.
Abler, Andrea M., author.
Rand Corporation, issuing body.
Acquisition and Technology Policy Center, researcher.
Juniper Networks, Inc., sponsoring body.
Rand Corporation. National Security Research Division, sponsoring body.
ISBN:9780124158177
012415817X
9780833085412
0833085417
9780833085740
0833085743
9780833087119
0833087118
Digital file characteristics:text file PDF
Notes:"RR-610-JNI."--Page 4 of cover.
"The research described in this report was sponsored by Juniper Networks and conducted within the Acquisition and Technology Policy Center of the RAND National Security Research Division"--Title page verso.
Includes bibliographical references (pages 53-65).
Online resource; title from PDF title page (ebrary, viewed April 22, 2014).
Summary:Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks).
Other form:Print version: Ablon, Lillian. Markets for cybercrime tools and stolen data. Santa Monica, CA : RAND Corporation, [2014] 0833087118
Description
Summary:

Knowledge-based Configuration incorporates knowledge representation formalisms to capture complex product models and reasoning methods to provide intelligent interactive behavior with the user. This book represents the first time that corporate and academic worlds collaborate integrating research and commercial benefits of knowledge-based configuration. Foundational interdisciplinary material is provided for composing models from increasingly complex products and services. Case studies, the latest research, and graphical knowledge representations that increase understanding of knowledge-based configuration provide a toolkit to continue to push the boundaries of what configurators can do and how they enable companies and customers to thrive.

Item Description:"RR-610-JNI."--Page 4 of cover.
"The research described in this report was sponsored by Juniper Networks and conducted within the Acquisition and Technology Policy Center of the RAND National Security Research Division"--Title page verso.
Physical Description:1 online resource (xv, 65 pages) : illustrations
Bibliography:Includes bibliographical references (pages 53-65).
ISBN:9780124158177
012415817X
9780833085412
0833085417
9780833085740
0833085743
9780833087119
0833087118