Logo

Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

Small book cover: Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by

Publisher: RAND Corporation
Number of pages: 83

Description:
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment.

Home page url

Download or read it online for free here:
Download link
(1.7MB, PDF)

Similar books

Book cover: The Security Development LifecycleThe Security Development Lifecycle
by - Microsoft Press
This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs -- the Security Development Lifecycle (SDL). Security experts guide you through each stage of the SDL -- from design to testing and post-release.
(5285 views)
Book cover: Software Update as a Mechanism for Resilience and SecuritySoftware Update as a Mechanism for Resilience and Security
- The National Academies Press
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies.
(4284 views)
Book cover: Information Security in EducationInformation Security in Education
- Wikibooks
This is an introduction to information security aimed primarily at K-12 administrators, educators, and technology staff. Security professionals have found that actions taken to increase security often have a minimal, or even opposite, effect.
(9631 views)
Book cover: Handbook of Information Security ManagementHandbook of Information Security Management
by - Auerbach Publications
This handbook provides dozens of case studies and analyzes showing you exactly how to protect systems and data using the latest tools. Learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
(12464 views)