Logo

Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

Small book cover: Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by

Publisher: RAND Corporation
Number of pages: 83

Description:
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment.

Home page url

Download or read it online for free here:
Download link
(1.7MB, PDF)

Similar books

Book cover: Software Update as a Mechanism for Resilience and SecuritySoftware Update as a Mechanism for Resilience and Security
- The National Academies Press
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies.
(1278 views)
Book cover: Selected Aspects of Computer Security in Open SystemsSelected Aspects of Computer Security in Open Systems
by - Australian Computer Emergency Response Team
This report examines the threats a computer system might face, and details what tools and techniques are available to combat them. An examination of common authentication techniques is provided, including X.509 Strong Authentication and Kerberos.
(5003 views)
Book cover: Security and Privacy in Wireless and Mobile NetworksSecurity and Privacy in Wireless and Mobile Networks
by - MDPI AG
Dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. The focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps.
(1365 views)
Book cover: Security Enhanced Applications for Information SystemsSecurity Enhanced Applications for Information Systems
by - InTech
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
(5555 views)