Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching

Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching

    • R$ 44,90
    • R$ 44,90

Descrição da editora

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

A cyberweapon is weaponized software code that exploits flaws in software. It is only effective if the flaw still exists at the time of weapon deployment. Because of this, there is only a small window of time in which a particular cyberweapon can be used. Many argue that cyberweapons can only be effectively used once, and that after first use, the vulnerability will be patched. However, the target must first detect the attack, find the vulnerability that was exploited, reverse-engineer the cyberweapon to identify signatures, then create and implement a patch. This window of opportunity between attack detection and patch implementation allows an attacker to reuse the cyberweapon against different or even the same targets as long as the window of opportunity remains open. An attacker can increase the length of time the window remains open by obfuscating the cyberweapon's signatures to make it harder to detect the attack or by making it harder to locate and remove the weapon. This can be accomplished by incorporating survivability into the weapon' s design requirement. This thesis explores the strategic implications of reusable cyberweapons by specifically looking at stealth as the critical attribute that allows a cyberweapon to go undetected and survive long enough to be effectively used more than once.

I. INTRODUCTION * A. OVERVIEW * B. SIGNIFICANCE OF A REUSABLE CYBERWEAPON * II. RELATED RESEARCH * A. OVERVIEW * B. DEFINING CYBERWEAPONS * 1. Classifying Types of Cyberweapons * C. VULNERABILITY LIFE CYCLE * 1. Discovering Vulnerabilities * 2. Reporting Vulnerabilities * 3. Patching Vulnerabilities * D. THE DEBATE ON PUBLIC DISCLOSURE * E. PERISHABILITY OF CYBERWEAPONS * 1. Risk of Rediscovery * F. TIMING THE USE OF CYBERWEAPONS * III. REUSABILITY * A. OVERVIEW * B. MALWARE SIGNATURES * C. NEGLIGENCE * 1. Unpatched Systems * 2. Outdated Antivirus Software * 3. Publicly Known Vulnerabilities * 4. The Human Element * D. PERSISTENCE * 1. Memory-Resident Malware * 2. Fileless Malware * 3. Supply Chain Manipulation * E. VARIATIONS * 1. Encryption and Packing * 2. Polymorphic and Metamorphic Malware * IV. STRATEGIC IMPLICATIONS OF A REUSABLE CYBERWEAPON * A. OVERVIEW * B. SURVIVABILITY * 1. Applying Survivability to Cyberweapons * 2. Deception and Concealment of Cyberweapons * C. DESIGNING A SURVIVABLE CYBERWEAPON * 1. Determining Probability of Mission Success * 2. Determining Measure of Effectiveness over Time * V. CONCLUSION * A. OVERVIEW * B. POLICY RECOMMENDATIONS * 1. The Benefits of a Reusable Cyberweapon * 2. The Debate on Cyberweapon Stockpiling * 3. Title 10 and Title 50 Policy Discussion * C. FUTURE RESEARCH

GÊNERO
Computadores e Internet
LANÇADO
2018
24 de junho
IDIOMA
EN
Inglês
PÁGINAS
115
EDITORA
Progressive Management
VENDEDOR
Draft2Digital, LLC
TAMANHO
491,5
KB

Mais livros de Progressive Management

First to Cut: Trauma Lessons Learned in the Combat Zone, Real-World Scenarios of Patient Care and Surgery, Valuable Advice for Surgeons (Emergency War Surgery Series) First to Cut: Trauma Lessons Learned in the Combat Zone, Real-World Scenarios of Patient Care and Surgery, Valuable Advice for Surgeons (Emergency War Surgery Series)
2012
John Boyd and John Warden: Air Power's Quest for Strategic Paralysis - Sun Tzu, Aftermath of Desert Storm Gulf War, Economic and Control Warfare, Industrial, Command, and Informational Targeting John Boyd and John Warden: Air Power's Quest for Strategic Paralysis - Sun Tzu, Aftermath of Desert Storm Gulf War, Economic and Control Warfare, Industrial, Command, and Informational Targeting
2016
Apollo and America's Moon Landing Program: Saturn V Flight Manual, Astronaut's Guide to the Apollo Moon Rocket, plus Flight Safety Plan and Review of Pogo Problems (Part 1) Apollo and America's Moon Landing Program: Saturn V Flight Manual, Astronaut's Guide to the Apollo Moon Rocket, plus Flight Safety Plan and Review of Pogo Problems (Part 1)
2014
Apollo and America's Moon Landing Program: History of the Development Program of the Saturn Rocket and the Saturn V from 1957 to 1968 by the Marshall Space Flight Center Apollo and America's Moon Landing Program: History of the Development Program of the Saturn Rocket and the Saturn V from 1957 to 1968 by the Marshall Space Flight Center
2012
Complete Guide to NASA's Mars Science Laboratory (MSL) Project - Mars Exploration Curiosity Rover, Radioisotope Power and Nuclear Safety Issues, Science Mission, Inspector General Report Complete Guide to NASA's Mars Science Laboratory (MSL) Project - Mars Exploration Curiosity Rover, Radioisotope Power and Nuclear Safety Issues, Science Mission, Inspector General Report
2011
21st Century Central Intelligence Agency (CIA) Intelligence Papers: Thinking and Writing, Cognitive Science and Intelligence Analysis, Center for the Study of Intelligence 21st Century Central Intelligence Agency (CIA) Intelligence Papers: Thinking and Writing, Cognitive Science and Intelligence Analysis, Center for the Study of Intelligence
2011