Zero Day Economy Essay

Improved Essays
An Overview of the Zero Day Economy:
Classification, Longevity, and Costs of Zero Day Exploits
Offensive cyber security hinges on exploiting vulnerabilities in order to create effects on adversaries’ cyber systems. A commonly shared belief in the field is that an attacker has more of an advantage if the effect uses an unknown vulnerability, also known as a zero day. Given this shared belief, the discovery of zero days, the process of turning them into reliable effects, and their eventual sale and use to either nation-state actors or criminal organizations is the foundation of offensive cyber security operations.
Despite this importance, the world surrounding zero days, primarily their development and their sale, has not garnered much formal research. It can be surmised that this is due to the specialized technical knowledge required to understand this field as well as the national security repercussions of some of the information on zero day capabilities.
…show more content…
RAND followed a vulnerability research company, labeled BUSBY, and tracked their inventory of zero days for fourteen years (Ablon & Bogart, 2017). RAND contributed to the field of zero day research by expanding on a typical classification of zero days, measuring the longevity of zero days, and measuring the costs of zero days.
Classification of Zero Day Exploits The first insight made by the researchers is that zero day exploits fall on a broader spectrum that as simply “Alive,” the vulnerability has not been disclosed, and “Dead,” the vulnerability has been disclosed. RAND corporation makes the distinction that the following are proper classifications for a zero day: “Living,” “Immortal,” “Security Patch,” “Killed by BUSBY,” “Publicly Shared,” and “Code Refactor” (Ablon & Bogart, 2017).
Zero Day

Related Documents

  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In 2014 hosts downloaded malware every 6 minutes In 2014 hosts accessed a malicious site every 24 seconds Corporate Data at Risk When mobile security is weak, it can provide attackers with personal information, passwords, business and personal email, corporate documents, and access to company networks and applications. In the business setting, that concern becomes magnified. In fact, 87 percent of IT professionals say careless employees are a greater threat to security than cybercriminals. And, 92 percent say employee behaviors could have made a difference in preventing high-profile security…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    On October 13th I attended Professor Ezekiel's class to sit in on a guest speaker. The speaker, Dr. Laurent Njilla is a Research Electronic Engineer at the Air Force Research Laboratory in Rome, NY. Dr. Njilla did not speak much of his professor as he had another objective in mind, speak about cyber security and the opportunities it presents. With only an hour to speak he quickly jumped into his PowerPoint with great enthusiasm for the topic at hand. The title of this summary was the theme of his presentation and this summary will report a few of the things he covered in the time frame he was given to speak.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Our recommendation to the National Security Council is to pursue Policy #4, using a honeynet to trap attackers and provide attribution. This technical solution is far more covert than our other alternative policies. It allows us to obtain knowledge about hackers’ methods and means of attack during their attempts to infiltrating sensitive data. Most importantly, it could potentially provide irrefutable evidence for attribution. This evidence enables the US to impose harsher sanctions without fear of a backlash.…

    • 381 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    This week’s lab introduces the student to various types of attacks that can be implemented by distributing a Trojan Horse script or by performing a variety of Denial-of-Service attacks (DoS). To begin to understand how these attacks are performed, the student is instilled with the knowledge as well as the use of file-hashes to identify compromised files and also how to generate file-hashes to establish baseline standards, which could benefit a Tripwire type regiment. Then, the lab takes the student through performing the various tasks associated with implementing such attacks by crafting a Trojan horse-like script.…

    • 1971 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Introduction In 2017, there have been several high profile cyber-attacks that have affected various systems across the country and the world. Among these cyber-criminals is the group known as the Shadow Brokers who debuted in August 2016 after claiming to have breached the spy tools of the Equation Group, an elite NSA-linked operation. In April 2017, the Shadow Brokers released what is said to be significant NSA tools which individuals have used to infect computer systems with ransomware. As a result of the Shadow Brokers’ breach, one strain of ransomware, WannaCry, spread worldwide in May 2017 hitting several targets that included public utilities and large corporations. It even attacked National Health Service facilities in Great Britain,…

    • 657 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Dos Assault

    • 567 Words
    • 3 Pages

    Singular assailants can likewise abuse weakness, break into target servers, and after that cut down administrations. Since it is troublesome for assailants to over-burden the objective's asset from a solitary PC, numerous current DoS assaults were propelled through countless assaulting has in the Internet. These assaults are called disseminated dissent of administration (DDoS) assaults. In a DDoS assault, on the grounds that the total of the assaulting movement can be enormous contrasted with the casualty's asset, the assault can drive the casualty to altogether minimize its administration execution or even quit conveying any administration. Contrasted and routine DoS assaults that could be tended to by better securing administration frameworks or denying unapproved remote or nearby get to, DDoS assaults are more intricate and harder to counteract.…

    • 567 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyberterrorism Cons

    • 120 Words
    • 1 Pages

    An enormous threat and instrument for warfare, “cyberterrorism”, with all its iterations, has potential for momentous damage, especially within infrastructures. With the potential for causing civil war, cyber sabotage is very likely to cause state to state interchanges. There is even a larger potential for war between nonstate entities. Just because there is no “ground zero physical crater”, it does not mean the scope of damage is not as significant. A Cyberterrorism preparation fund may be something most major corporations and governments need in this modern internet-technological age.…

    • 120 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Throughout his article, Joshua Sinai provides us with several examples of the types of warfare terrorist generally employ to achieve their objectives. These examples included conventional low impact, conventional high impact, and lastly cyber warfare (Sinai, 2007). Within CHI there is several different categories of attacks. The categories’ within CHI include chemical, biological, radiological, and lastly nuclear.…

    • 351 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Abstract This paper presents information derived from peered reviewed works on the topic of cyber warfare that was gathered using the Virginia Wesleyan College Online Library. Cyber warfare is often categorized with nuclear, chemical and biological weapons as a potential weapon of mass destruction (WMD). Cyber warfare is at its basic level the gathering of electronic information. The term cyber warfare is often exploited to describe a new type of warfare and to create the notion that computers and networks are a new battlefield.…

    • 225 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    Background Information Crowdsourcing information security uses the reach of crowdsourcing to tackle problems involving information security and cyber security. To effectively crowdsource a task, especially in information security, three criteria must be met: • First, the crowdsourcing task must be solvable by a large group. • Second, the requester must have access to a large group of people that work either collaboratively or independently toward a solution. • Third, the requester needs to attract these people to engage in a crowdsourcing task via an open call (Hetmank, 2014).…

    • 1293 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Token Economy Essay

    • 1926 Words
    • 8 Pages

    Token economies reinforce desired behavior through the delivery of tokens or chips that can be exchanged for back-up reinforcers in the way of desired objects or privileges. In a token economy, there are three major elements: There must be a specific list of clearly defined target behaviors; tokens or points must be identified; and there must be a list of backup reinforcers or items for which the saved tokens can be exchanged (Miltenberger, 2012). In preparing to implement the token economy, six basic steps, as follows, must be followed in order to ensure success: identify tokens, identify behaviors, select back-up reinforcers, establish the exchange ratio, establish procedures for dispensing and exchanging tokens, and field test the system…

    • 1926 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    bstract An analysis is performed of global interconnectivity around cybersecurity and its impact on the pursuit of global commerce. Cultural influences, practices, and perspectives are reflected upon as they incorporate ethical, political, and social viewpoints. Cultural philosophical perspectives integrate attitudes, beliefs, values, and political agendas which help navigate tangible or intangible formations of a particular culture. As a result, products involve underlying beliefs and values and cultural practices.…

    • 1383 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays