Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar
by Lillian Ablon, Martin C. Libicki, Andrea A. Golay
Publisher: RAND Corporation 2014
Number of pages: 83
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these markets and how they have grown into their current state to explain how their existence can harm the information security environment.
Home page url
Download or read it online for free here:
by WeiQi Yan, Jonathan Weir - BookBoon
This introductory text covers media security, highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding.
by Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
by Danny Smith - Australian Computer Emergency Response Team
This report examines the threats a computer system might face, and details what tools and techniques are available to combat them. An examination of common authentication techniques is provided, including X.509 Strong Authentication and Kerberos.
by Ross J. Anderson, Ross Anderson - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.