Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463562703
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463562703
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

A cyberweapon is weaponized software code that exploits flaws in software. It is only effective if the flaw still exists at the time of weapon deployment. Because of this, there is only a small window of time in which a particular cyberweapon can be used. Many argue that cyberweapons can only be effectively used once, and that after first use, the vulnerability will be patched. However, the target must first detect the attack, find the vulnerability that was exploited, reverse-engineer the cyberweapon to identify signatures, then create and implement a patch. This window of opportunity between attack detection and patch implementation allows an attacker to reuse the cyberweapon against different or even the same targets as long as the window of opportunity remains open. An attacker can increase the length of time the window remains open by obfuscating the cyberweapon's signatures to make it harder to detect the attack or by making it harder to locate and remove the weapon. This can be accomplished by incorporating survivability into the weapon' s design requirement. This thesis explores the strategic implications of reusable cyberweapons by specifically looking at stealth as the critical attribute that allows a cyberweapon to go undetected and survive long enough to be effectively used more than once.

I. INTRODUCTION * A. OVERVIEW * B. SIGNIFICANCE OF A REUSABLE CYBERWEAPON * II. RELATED RESEARCH * A. OVERVIEW * B. DEFINING CYBERWEAPONS * 1. Classifying Types of Cyberweapons * C. VULNERABILITY LIFE CYCLE * 1. Discovering Vulnerabilities * 2. Reporting Vulnerabilities * 3. Patching Vulnerabilities * D. THE DEBATE ON PUBLIC DISCLOSURE * E. PERISHABILITY OF CYBERWEAPONS * 1. Risk of Rediscovery * F. TIMING THE USE OF CYBERWEAPONS * III. REUSABILITY * A. OVERVIEW * B. MALWARE SIGNATURES * C. NEGLIGENCE * 1. Unpatched Systems * 2. Outdated Antivirus Software * 3. Publicly Known Vulnerabilities * 4. The Human Element * D. PERSISTENCE * 1. Memory-Resident Malware * 2. Fileless Malware * 3. Supply Chain Manipulation * E. VARIATIONS * 1. Encryption and Packing * 2. Polymorphic and Metamorphic Malware * IV. STRATEGIC IMPLICATIONS OF A REUSABLE CYBERWEAPON * A. OVERVIEW * B. SURVIVABILITY * 1. Applying Survivability to Cyberweapons * 2. Deception and Concealment of Cyberweapons * C. DESIGNING A SURVIVABLE CYBERWEAPON * 1. Determining Probability of Mission Success * 2. Determining Measure of Effectiveness over Time * V. CONCLUSION * A. OVERVIEW * B. POLICY RECOMMENDATIONS * 1. The Benefits of a Reusable Cyberweapon * 2. The Debate on Cyberweapon Stockpiling * 3. Title 10 and Title 50 Policy Discussion * C. FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

A cyberweapon is weaponized software code that exploits flaws in software. It is only effective if the flaw still exists at the time of weapon deployment. Because of this, there is only a small window of time in which a particular cyberweapon can be used. Many argue that cyberweapons can only be effectively used once, and that after first use, the vulnerability will be patched. However, the target must first detect the attack, find the vulnerability that was exploited, reverse-engineer the cyberweapon to identify signatures, then create and implement a patch. This window of opportunity between attack detection and patch implementation allows an attacker to reuse the cyberweapon against different or even the same targets as long as the window of opportunity remains open. An attacker can increase the length of time the window remains open by obfuscating the cyberweapon's signatures to make it harder to detect the attack or by making it harder to locate and remove the weapon. This can be accomplished by incorporating survivability into the weapon' s design requirement. This thesis explores the strategic implications of reusable cyberweapons by specifically looking at stealth as the critical attribute that allows a cyberweapon to go undetected and survive long enough to be effectively used more than once.

I. INTRODUCTION * A. OVERVIEW * B. SIGNIFICANCE OF A REUSABLE CYBERWEAPON * II. RELATED RESEARCH * A. OVERVIEW * B. DEFINING CYBERWEAPONS * 1. Classifying Types of Cyberweapons * C. VULNERABILITY LIFE CYCLE * 1. Discovering Vulnerabilities * 2. Reporting Vulnerabilities * 3. Patching Vulnerabilities * D. THE DEBATE ON PUBLIC DISCLOSURE * E. PERISHABILITY OF CYBERWEAPONS * 1. Risk of Rediscovery * F. TIMING THE USE OF CYBERWEAPONS * III. REUSABILITY * A. OVERVIEW * B. MALWARE SIGNATURES * C. NEGLIGENCE * 1. Unpatched Systems * 2. Outdated Antivirus Software * 3. Publicly Known Vulnerabilities * 4. The Human Element * D. PERSISTENCE * 1. Memory-Resident Malware * 2. Fileless Malware * 3. Supply Chain Manipulation * E. VARIATIONS * 1. Encryption and Packing * 2. Polymorphic and Metamorphic Malware * IV. STRATEGIC IMPLICATIONS OF A REUSABLE CYBERWEAPON * A. OVERVIEW * B. SURVIVABILITY * 1. Applying Survivability to Cyberweapons * 2. Deception and Concealment of Cyberweapons * C. DESIGNING A SURVIVABLE CYBERWEAPON * 1. Determining Probability of Mission Success * 2. Determining Measure of Effectiveness over Time * V. CONCLUSION * A. OVERVIEW * B. POLICY RECOMMENDATIONS * 1. The Benefits of a Reusable Cyberweapon * 2. The Debate on Cyberweapon Stockpiling * 3. Title 10 and Title 50 Policy Discussion * C. FUTURE RESEARCH

More books from Progressive Management

Cover of the book Apollo and America's Moon Landing Program: The Saturn Management Concept - The Reasons Behind the Success of the Saturn V Moon Rocket Program (NASA CR-129029) by Progressive Management
Cover of the book America's Civil War 1861 to 1865: Army Military History of the War Between the States from Secession and Fort Sumter to Lee's Surrender at Appomattox by Progressive Management
Cover of the book The Evolution of the Combined Allied Headquarters in the North African Theater of Operations from 1942 to 1943: World War II Unity of Effort and Command, Eisenhower and Multinational Integration by Progressive Management
Cover of the book Operational Reconnaissance: Identifying the Right Problems in a Complex World – Case Studies of World War II and 2006 Israeli-Hezbollah War, Intelligence Objectives, Capabilities, and Planning by Progressive Management
Cover of the book Population Isolation in the Philippine War: A Case Study - Little-known Measure of Pacification by the U.S. Army Against Insurrectos on Luzon, Samar, and Marinduque, Concentration and Resettlement by Progressive Management
Cover of the book Geopolitics and Planning for a High-End Fight: NATO and the Baltic Region, Airpower and Geopolitical Angst, The New Russian Threat, Considering a High-End Fight with Russia, Putin by Progressive Management
Cover of the book Small Wind Electric Systems: Consumers Guide with Practical Information for Homeowners, Farmer, Ranchers, Small Businesses by Progressive Management
Cover of the book Cultural Intelligence for the Commander: A Necessary Ingredient - The Japanese in World War II, Lessons from Operation Iraqi Freedom, Emerging Threat of Terrorism, Need for Actionable Intelligence by Progressive Management
Cover of the book The Air Campaign: John Warden and the Classical Airpower Theorists - Giulio Douhet, Hugh Trenchard, Billy Mitchell, World War I Context, New World, British Empire, Continental Theories, Gulf War by Progressive Management
Cover of the book Planning for Action: Campaign Concepts and Tools - Wargaming, Clausewitz, Iraq, Petraeus, Afghanistan, Tommy Franks, Dr. Strange, War Against Terrorism, Hurricane Katrina, Post 9/11 by Progressive Management
Cover of the book 21st Century Ankylosing Spondylitis (AS) Sourcebook: Clinical Data for Patients, Families, and Physicians - Seronegative Spondyloarthropathy, Arthritis, Back Pain, Sacroiliitis, Related Conditions by Progressive Management
Cover of the book Search and Rescue in Southeast Asia: USAF in Southeast Asia - SAR from World War II to the 1970s, Vietnam Escalation, Son Tay to Cease-fire, Mayaguez, Helicopter Rescues Plucking Fallen Aircrews by Progressive Management
Cover of the book Applications in Operational Culture: Perspectives from the Field - Marine Corps Historical Perspective, Iraq, Afghanistan, al-Qaeda, Pashtun Tribes, Iraqi Army, Long Fight in the Long War by Progressive Management
Cover of the book Factors of Religious Violence and a Path to Peace: A Study of the 16th Century Anabaptists - Radical Protestant Reformation, Apocalypticism, Melchioite Leaders, Munster Rebellion, Christian Doctrine by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: On The Moon With Apollo 16 - A Guidebook to the Descartes Region by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy