Markets for cybercrime tools and stolen data hackers' bazaar

Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these mark...

Full description

Bibliographic Details
Main Authors: Ablon, Lillian, Libicki, Martin C. (Author), Abler, Andrea M. (Author)
Corporate Author: Juniper Networks, Inc.
Format: eBook
Language:English
Published: Santa Monica, California RAND Corporation [2014]©2014, 2014
Subjects:
Online Access:
Collection: JSTOR Open Access Books - Collection details see MPG.ReNa
LEADER 03680nam a2200481 u 4500
001 EB001843154
003 EBX01000000000000001007143
005 00000000000000.0
007 tu|||||||||||||||||||||
008 180730 r ||| eng
020 |z 9780833087119 
020 |a 9780833087119 
020 |z 0833087118 
020 |a 0833087118 
050 4 |a HV6773 
100 1 |a Ablon, Lillian 
245 0 0 |a Markets for cybercrime tools and stolen data  |h Elektronische Ressource  |b hackers' bazaar  |c Lillian Ablon, Martin C. Libicki, Andrea A. Golay 
260 |a Santa Monica, California  |b RAND Corporation  |c [2014]©2014, 2014 
300 |a xv, 65 pages  |b illustrations 
505 0 |a Introduction and research methodology -- Characteristics of the black market -- The black market and botnets -- Zero-day vulnerabilities in the black and gray markets -- Are hacker black markets mature? -- Projections and predictions for the black market -- Conclusions -- For future research -- Appendix A: Text of the black market timeline -- Appendix B: Glossary 
505 0 |a Includes bibliographical references (pages 53-65) 
600 1 4 |a Grässe, .. 
653 |a SOCIAL SCIENCE / Criminology 
653 |a Hacking 
653 |a Schwarzmarkt 
653 |a Black market 
653 |a Data protection 
653 |a COMPUTERS / Internet / Security 
700 1 |a Libicki, Martin C.  |e [author] 
700 1 |a Abler, Andrea M.  |e [author] 
710 2 |a Juniper Networks, Inc. 
041 0 7 |a eng  |2 ISO 639-2 
989 |b ZDB-39-JOA  |a JSTOR Open Access Books 
500 |a "RR-610-JNI."--Page 4 of cover. - "The research described in this report was sponsored by Juniper Networks and conducted within the Acquisition and Technology Policy Center of the RAND National Security Research Division"--Title page verso 
776 |z 0833085743 
776 |z 9780833085740 
776 |z 012415817X 
776 |z 9780124158177 
776 |z 0833085417 
776 |z 9780833085412 
856 4 0 |u https://www.jstor.org/stable/10.7249/j.ctt6wq7z6  |x Verlag  |3 Volltext 
082 0 |a 364.168 
520 |a Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks)