The Locator -- [(author = "Rand Corporation National Security Research Division")]

115 records matched your query       


Record 31 | Previous Record | Long Display | Next Record
03799aam a2200433Ii 4500
001 BED3ADD06B5511E69AFE1DDBDAD10320
003 SILO
005 20160826010517
008 140703t20142014caua     b    000 0 eng d
020    $a 9780833087119 (pbk.) :
020    $a 0833087118 (pbk.) :
035    $a (OCoLC)882601949
040    $a YDXCP $b eng $c YDXCP $d BTCTA $d BDX $d SYB $d ABC $d IPL $d IWA $d SILO
050  4 $a HV6773 A25x 2014
100 1  $a Ablon, Lillian, $e author.
245 10 $a Markets for cybercrime tools and stolen data : $b hackers' bazaar / $c Lillian Ablon, Martin C. Libicki, Andrea A. Golay.
264  1 $a Santa Monica, CA : $b RAND Corporation, $c [2014]
300    $a xv, 65 pages : $b color illustrations ; $c 28 cm.
500    $a "RAND National Security Research Division."
500    $a "The research described in this report was sponsored by Juniper Networks and conducted within the Acquisition and Technology Policy Center of the RAND National Security Research Division"--Verso of title page.
500    $a "RR-610-JNI"--Page 4 of cover.
504    $a Includes bibliographical references (pages 53-65).
505 0  $a Summary -- Introduction and research methodology -- Characteristics of the black market -- The black market and botnets -- Zero-day vulnerabilities in the black and gray markets -- Are hacker black markets mature? -- Projections and predictions for the black market -- Conclusions -- For future research -- Appendixes. A. Text of the black market timeline ; B. Glossary.
520 3  $a "Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment. Understanding the current and predicted landscape for these markets lays the groundwork for follow-on exploration of options to minimize the potentially harmful influence these markets impart. Experts agree that the coming years will bring more activity in darknets, more use of crypto-currencies, greater anonymity capabilities in malware, and more attention to encrypting and protecting communications and transactions; that the ability to stage cyberattacks will likely outpace the ability to defend against them; that crime will increasingly have a networked or cyber component, creating a wider range of opportunities for black markets; and that there will be more hacking for hire, as-a-service offerings, and brokers. Experts disagree, however, on who will be most affected by the growth of the black market (e.g., small or large businesses, individuals), what products will be on the rise (e.g., fungible goods, such as data records and credit card information; non-fungible goods, such as intellectual property), or which types of attacks will be most prevalent (e.g., persistent, targeted attacks; opportunistic, mass 'smash-and-grab' attacks)."
650  0 $a Computer crimes $x Economic aspects.
650  0 $a Black market.
650  0 $a Data protection.
650  0 $a Hacking.
700 0  $a Libicki, Martin C. $e author.
700 1  $a Golay, Andrea A., $e author.
710 2  $a Rand Corporation, $e issuing body.
710 2  $a Acquisition and Technology Policy Center, $e researcher.
710 2  $a Juniper Networks, Inc., $e sponsoring body.
710 2  $a Rand Corporation. $b National Security Research Division, $e sponsoring body.
941    $a 2
952    $l OVUX522 $d 20231021013001.0
952    $l USUX851 $d 20160826100848.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=BED3ADD06B5511E69AFE1DDBDAD10320
994    $a C0 $b IWA

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.