Logo

Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

Small book cover: Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by

Publisher: RAND Corporation
Number of pages: 83

Description:
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment.

Home page url

Download or read it online for free here:
Download link
(1.7MB, PDF)

Similar books

Book cover: Policing Cyber CrimePolicing Cyber Crime
by - BookBoon
From the table of contents: Introduction; Cyber Crime Defined; Cyber Crime Cases; Child Grooming Case; Crime Protection; Corporate Reputation; Knowledge Management; Intelligence Strategy; Crime Investigations; References.
(14591 views)
Book cover: Security+ EssentialsSecurity+ Essentials
- Techotopia
This is an online book for people studying for the CompTIA Security+ exam and for those interested in designing and implementing secure IT environments. The concepts in this book apply equally to Windows, Linux, UNIX, and MacOS X.
(16175 views)
Book cover: What If Crime Were Impossible?What If Crime Were Impossible?
by - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.
(10049 views)
Book cover: Cyber Infrastructure ProtectionCyber Infrastructure Protection
by - Strategic Studies Institute
This book provides an integrated view of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development and an analysis of technology challenges that impede cyber infrastructure protection.
(11712 views)