Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463562703
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463562703
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

A cyberweapon is weaponized software code that exploits flaws in software. It is only effective if the flaw still exists at the time of weapon deployment. Because of this, there is only a small window of time in which a particular cyberweapon can be used. Many argue that cyberweapons can only be effectively used once, and that after first use, the vulnerability will be patched. However, the target must first detect the attack, find the vulnerability that was exploited, reverse-engineer the cyberweapon to identify signatures, then create and implement a patch. This window of opportunity between attack detection and patch implementation allows an attacker to reuse the cyberweapon against different or even the same targets as long as the window of opportunity remains open. An attacker can increase the length of time the window remains open by obfuscating the cyberweapon's signatures to make it harder to detect the attack or by making it harder to locate and remove the weapon. This can be accomplished by incorporating survivability into the weapon' s design requirement. This thesis explores the strategic implications of reusable cyberweapons by specifically looking at stealth as the critical attribute that allows a cyberweapon to go undetected and survive long enough to be effectively used more than once.

I. INTRODUCTION * A. OVERVIEW * B. SIGNIFICANCE OF A REUSABLE CYBERWEAPON * II. RELATED RESEARCH * A. OVERVIEW * B. DEFINING CYBERWEAPONS * 1. Classifying Types of Cyberweapons * C. VULNERABILITY LIFE CYCLE * 1. Discovering Vulnerabilities * 2. Reporting Vulnerabilities * 3. Patching Vulnerabilities * D. THE DEBATE ON PUBLIC DISCLOSURE * E. PERISHABILITY OF CYBERWEAPONS * 1. Risk of Rediscovery * F. TIMING THE USE OF CYBERWEAPONS * III. REUSABILITY * A. OVERVIEW * B. MALWARE SIGNATURES * C. NEGLIGENCE * 1. Unpatched Systems * 2. Outdated Antivirus Software * 3. Publicly Known Vulnerabilities * 4. The Human Element * D. PERSISTENCE * 1. Memory-Resident Malware * 2. Fileless Malware * 3. Supply Chain Manipulation * E. VARIATIONS * 1. Encryption and Packing * 2. Polymorphic and Metamorphic Malware * IV. STRATEGIC IMPLICATIONS OF A REUSABLE CYBERWEAPON * A. OVERVIEW * B. SURVIVABILITY * 1. Applying Survivability to Cyberweapons * 2. Deception and Concealment of Cyberweapons * C. DESIGNING A SURVIVABLE CYBERWEAPON * 1. Determining Probability of Mission Success * 2. Determining Measure of Effectiveness over Time * V. CONCLUSION * A. OVERVIEW * B. POLICY RECOMMENDATIONS * 1. The Benefits of a Reusable Cyberweapon * 2. The Debate on Cyberweapon Stockpiling * 3. Title 10 and Title 50 Policy Discussion * C. FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

A cyberweapon is weaponized software code that exploits flaws in software. It is only effective if the flaw still exists at the time of weapon deployment. Because of this, there is only a small window of time in which a particular cyberweapon can be used. Many argue that cyberweapons can only be effectively used once, and that after first use, the vulnerability will be patched. However, the target must first detect the attack, find the vulnerability that was exploited, reverse-engineer the cyberweapon to identify signatures, then create and implement a patch. This window of opportunity between attack detection and patch implementation allows an attacker to reuse the cyberweapon against different or even the same targets as long as the window of opportunity remains open. An attacker can increase the length of time the window remains open by obfuscating the cyberweapon's signatures to make it harder to detect the attack or by making it harder to locate and remove the weapon. This can be accomplished by incorporating survivability into the weapon' s design requirement. This thesis explores the strategic implications of reusable cyberweapons by specifically looking at stealth as the critical attribute that allows a cyberweapon to go undetected and survive long enough to be effectively used more than once.

I. INTRODUCTION * A. OVERVIEW * B. SIGNIFICANCE OF A REUSABLE CYBERWEAPON * II. RELATED RESEARCH * A. OVERVIEW * B. DEFINING CYBERWEAPONS * 1. Classifying Types of Cyberweapons * C. VULNERABILITY LIFE CYCLE * 1. Discovering Vulnerabilities * 2. Reporting Vulnerabilities * 3. Patching Vulnerabilities * D. THE DEBATE ON PUBLIC DISCLOSURE * E. PERISHABILITY OF CYBERWEAPONS * 1. Risk of Rediscovery * F. TIMING THE USE OF CYBERWEAPONS * III. REUSABILITY * A. OVERVIEW * B. MALWARE SIGNATURES * C. NEGLIGENCE * 1. Unpatched Systems * 2. Outdated Antivirus Software * 3. Publicly Known Vulnerabilities * 4. The Human Element * D. PERSISTENCE * 1. Memory-Resident Malware * 2. Fileless Malware * 3. Supply Chain Manipulation * E. VARIATIONS * 1. Encryption and Packing * 2. Polymorphic and Metamorphic Malware * IV. STRATEGIC IMPLICATIONS OF A REUSABLE CYBERWEAPON * A. OVERVIEW * B. SURVIVABILITY * 1. Applying Survivability to Cyberweapons * 2. Deception and Concealment of Cyberweapons * C. DESIGNING A SURVIVABLE CYBERWEAPON * 1. Determining Probability of Mission Success * 2. Determining Measure of Effectiveness over Time * V. CONCLUSION * A. OVERVIEW * B. POLICY RECOMMENDATIONS * 1. The Benefits of a Reusable Cyberweapon * 2. The Debate on Cyberweapon Stockpiling * 3. Title 10 and Title 50 Policy Discussion * C. FUTURE RESEARCH

More books from Progressive Management

Cover of the book Russia's Revival: Ambitions, Limitations, and Opportunities for the United States - Vladimir Putin's Record, Corruption Complex, Military, Near Abroad, China, Iran, Implications for United States by Progressive Management
Cover of the book 2011 Complete Guide to Saudi Arabia: Oil and Energy, King Abdullah, Military, Human and Religious Rights, Islam, Mecca and Medina, History, Trade, Economy - Authoritative Coverage by Progressive Management
Cover of the book The Planner's Role in the Civil-Military Relationship: Syrian Crisis Action Planning (2011-2013) - CAP Work During Obama Administration, Hagel, Dempsey, Response to Syrian Chemical Weapons Usage by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Apollo 12 Technical Crew Debriefing with Unique Observations about the Second Lunar Landing - Astronauts Conrad, Gordon, Bean by Progressive Management
Cover of the book Libya's Operation Odyssey Dawn: Analysis of the American Military Operation, Removal of the Gaddafi Regime, NATO's Air War, Command and Control Issues, Responsibility to Protect (R2P) by Progressive Management
Cover of the book The Revolutionary War (War of American Independence): United States Army and the Forging of a Nation, from Colonial Militia to the Continental Army in the American Revolution, Valley Forge, Yorktown by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: National Guard Weapons of Mass Destruction Civil Support Team Management, CBRNE Enhanced Response Force Package Management by Progressive Management
Cover of the book 2011 Al Qaeda and Affiliates: Historical Perspective, Global Presence, and Implications for U.S. Policy - Congressional Research Service Report by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Gastric Cancer (Stomach Cancer) - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Survivability on the Island of Spice: The Development of the UH-60 Blackhawk Helicopter and its Baptism of Fire in Operation Urgent Fury on Grenada - Effect of Poor Intelligence Flying into Enemy Fire by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Communications in a "Come-As-You-Are" War - FM 24-12 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Fire Effects Guide (PMS 481) - Wildland and Forest Fire Behavior, Characteristics, Fuels, Air Quality, Soils, Water, Plants, Wildlife, Habitat, Cultural Resources, Grazing Management by Progressive Management
Cover of the book Cold War Infrastructure for Strategic Air Command (SAC): The Bomber Mission - Hangars, Command Posts, Major Commands, B-36, B-47, and B-52, Sixteen Air Force Bases from Barksdale to Whiteman by Progressive Management
Cover of the book 21st Century Peacekeeping and Stability Operations Institute (PKSOI) Papers - The State-Owned Enterprise as a Vehicle for Stability - Liberia, Kosovo, Iraq, Mozambique, Afghanistan by Progressive Management
Cover of the book Project Y: The Los Alamos Project - Manhattan District History, The Development of the First Atomic Bomb, Trinity, Alberta Project, Tinian, Plutonium, Uranium, Experiments, Physics and Explosives by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy