Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2010-2014  (1)
  • 2014  (1)
  • Rand Corporation  (1)
  • Guth, Karl-Maria
  • Santa Monica, California : RAND Corporation  (1)
Datasource
Material
Language
Years
  • 2010-2014  (1)
Year
  • 2014  (1)
  • 1
    ISBN: 9780833085412 , 0833085417 , 9780833085740 , 0833085743 , 9780833087119 , 012415817X , 0833087118 , 9780124158177
    Language: English
    Pages: 1 Online-Ressource (xv, 65 pages)
    Parallel Title: Print version Ablon, Lillian Markets for cybercrime tools and stolen data
    DDC: 364.168
    Keywords: Hacking ; Computer crimes Economic aspects ; Black market ; Data protection ; Hacking ; Computer crimes ; Black market ; Data protection ; Hacking ; Schwarzmarkt ; Datensicherung ; Internetkriminalität ; Computerkriminalität ; Criminology, Penology & Juvenile Delinquency ; Social Sciences ; Social Welfare & Social Work ; COMPUTERS ; Internet ; Security ; Grässe ; SOCIAL SCIENCE ; Criminology ; Black market ; Data protection ; Electronic books
    Abstract: Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks)
    Abstract: Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass "smash-and-grab" attacks)
    Note: "RR-610-JNI."--Page 4 of cover , "The research described in this report was sponsored by Juniper Networks and conducted within the Acquisition and Technology Policy Center of the RAND National Security Research Division"--Title page verso , Includes bibliographical references (pages 53-65)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...