Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463562703
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463562703
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

A cyberweapon is weaponized software code that exploits flaws in software. It is only effective if the flaw still exists at the time of weapon deployment. Because of this, there is only a small window of time in which a particular cyberweapon can be used. Many argue that cyberweapons can only be effectively used once, and that after first use, the vulnerability will be patched. However, the target must first detect the attack, find the vulnerability that was exploited, reverse-engineer the cyberweapon to identify signatures, then create and implement a patch. This window of opportunity between attack detection and patch implementation allows an attacker to reuse the cyberweapon against different or even the same targets as long as the window of opportunity remains open. An attacker can increase the length of time the window remains open by obfuscating the cyberweapon's signatures to make it harder to detect the attack or by making it harder to locate and remove the weapon. This can be accomplished by incorporating survivability into the weapon' s design requirement. This thesis explores the strategic implications of reusable cyberweapons by specifically looking at stealth as the critical attribute that allows a cyberweapon to go undetected and survive long enough to be effectively used more than once.

I. INTRODUCTION * A. OVERVIEW * B. SIGNIFICANCE OF A REUSABLE CYBERWEAPON * II. RELATED RESEARCH * A. OVERVIEW * B. DEFINING CYBERWEAPONS * 1. Classifying Types of Cyberweapons * C. VULNERABILITY LIFE CYCLE * 1. Discovering Vulnerabilities * 2. Reporting Vulnerabilities * 3. Patching Vulnerabilities * D. THE DEBATE ON PUBLIC DISCLOSURE * E. PERISHABILITY OF CYBERWEAPONS * 1. Risk of Rediscovery * F. TIMING THE USE OF CYBERWEAPONS * III. REUSABILITY * A. OVERVIEW * B. MALWARE SIGNATURES * C. NEGLIGENCE * 1. Unpatched Systems * 2. Outdated Antivirus Software * 3. Publicly Known Vulnerabilities * 4. The Human Element * D. PERSISTENCE * 1. Memory-Resident Malware * 2. Fileless Malware * 3. Supply Chain Manipulation * E. VARIATIONS * 1. Encryption and Packing * 2. Polymorphic and Metamorphic Malware * IV. STRATEGIC IMPLICATIONS OF A REUSABLE CYBERWEAPON * A. OVERVIEW * B. SURVIVABILITY * 1. Applying Survivability to Cyberweapons * 2. Deception and Concealment of Cyberweapons * C. DESIGNING A SURVIVABLE CYBERWEAPON * 1. Determining Probability of Mission Success * 2. Determining Measure of Effectiveness over Time * V. CONCLUSION * A. OVERVIEW * B. POLICY RECOMMENDATIONS * 1. The Benefits of a Reusable Cyberweapon * 2. The Debate on Cyberweapon Stockpiling * 3. Title 10 and Title 50 Policy Discussion * C. FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

A cyberweapon is weaponized software code that exploits flaws in software. It is only effective if the flaw still exists at the time of weapon deployment. Because of this, there is only a small window of time in which a particular cyberweapon can be used. Many argue that cyberweapons can only be effectively used once, and that after first use, the vulnerability will be patched. However, the target must first detect the attack, find the vulnerability that was exploited, reverse-engineer the cyberweapon to identify signatures, then create and implement a patch. This window of opportunity between attack detection and patch implementation allows an attacker to reuse the cyberweapon against different or even the same targets as long as the window of opportunity remains open. An attacker can increase the length of time the window remains open by obfuscating the cyberweapon's signatures to make it harder to detect the attack or by making it harder to locate and remove the weapon. This can be accomplished by incorporating survivability into the weapon' s design requirement. This thesis explores the strategic implications of reusable cyberweapons by specifically looking at stealth as the critical attribute that allows a cyberweapon to go undetected and survive long enough to be effectively used more than once.

I. INTRODUCTION * A. OVERVIEW * B. SIGNIFICANCE OF A REUSABLE CYBERWEAPON * II. RELATED RESEARCH * A. OVERVIEW * B. DEFINING CYBERWEAPONS * 1. Classifying Types of Cyberweapons * C. VULNERABILITY LIFE CYCLE * 1. Discovering Vulnerabilities * 2. Reporting Vulnerabilities * 3. Patching Vulnerabilities * D. THE DEBATE ON PUBLIC DISCLOSURE * E. PERISHABILITY OF CYBERWEAPONS * 1. Risk of Rediscovery * F. TIMING THE USE OF CYBERWEAPONS * III. REUSABILITY * A. OVERVIEW * B. MALWARE SIGNATURES * C. NEGLIGENCE * 1. Unpatched Systems * 2. Outdated Antivirus Software * 3. Publicly Known Vulnerabilities * 4. The Human Element * D. PERSISTENCE * 1. Memory-Resident Malware * 2. Fileless Malware * 3. Supply Chain Manipulation * E. VARIATIONS * 1. Encryption and Packing * 2. Polymorphic and Metamorphic Malware * IV. STRATEGIC IMPLICATIONS OF A REUSABLE CYBERWEAPON * A. OVERVIEW * B. SURVIVABILITY * 1. Applying Survivability to Cyberweapons * 2. Deception and Concealment of Cyberweapons * C. DESIGNING A SURVIVABLE CYBERWEAPON * 1. Determining Probability of Mission Success * 2. Determining Measure of Effectiveness over Time * V. CONCLUSION * A. OVERVIEW * B. POLICY RECOMMENDATIONS * 1. The Benefits of a Reusable Cyberweapon * 2. The Debate on Cyberweapon Stockpiling * 3. Title 10 and Title 50 Policy Discussion * C. FUTURE RESEARCH

More books from Progressive Management

Cover of the book 21st Century U.S. Military Manuals: Security Force Assistance - Field Manual 3-07.1 - Brigade Operations, Sustainment (Professional Format Series) by Progressive Management
Cover of the book Afghanistan Brigade Combat Team (BCT) - Provincial Reconstruction Team (PRT) Unity of Effort Reference Guide, Observations, Insights, and Lessons by Progressive Management
Cover of the book NASA Space Technology Report: EVA Radio - Desert Research and Technology Studies DRATS 2011 Report, Analog Testing of Technologies for Human Space Exploration by Progressive Management
Cover of the book Organized Crime Growth and Sustainment: A Review of the Influence of Popular Religion and Beliefs in Mexico - Drug Gangs, El Chapo, Narco-Cultura, Narco-Corridos, Sinaloa Cartel, Malverde Cult, Saints by Progressive Management
Cover of the book 21st Century FEMA Study Course: Applications of GIS for Emergency Management (IS-922) - Geographical Information Systems Database Tools, Fundamentals, History, Usefulness by Progressive Management
Cover of the book Interagency Fratricide: Policy Failures in the Persian Gulf War and Bosnia Crisis - Rational Foreign Policy Decision Making Findings, National Security Council, Developing Endgame, Termination Policy by Progressive Management
Cover of the book U.S. Marines in the Korean War: Authoritative Official History from the Frozen Chosin to the Armistice, Extensive Aircraft, Helicopter, and Equipment Coverage, Major League Reservists, Ted Williams by Progressive Management
Cover of the book 21st Century Emergency War Surgery Textbook by the U.S. Army: Weapons Injuries, Triage, Shock, Anesthesia, Infections, Critical Care, Amputations, Burns, Specific Injury Treatment by Progressive Management
Cover of the book Deterrence and Saddam Hussein: Lessons from the 1990-1991 Gulf War - Limits of Deterrence, Cold War Theory, Bush versus Saddam Hussein, Chemical and Biological Weapons, Kuwait Invasion, Desert Storm by Progressive Management
Cover of the book The History of Large Federal Dams: Planning, Design, and Construction in the Era of Big Dams - Hoover, Glen Canyon, Bonneville, Central Valley Project, FDR, Muir, Conservation, Environmental Impact by Progressive Management
Cover of the book Seeing Off the Bear: Anglo-American Air Power Cooperation During the Cold War - Missiles, Ground-Launched Cruise Missiles, RAF Aircraft, Skybolt, Overflying the Soviet Union, Cuban Missile Crisis by Progressive Management
Cover of the book Croatia in Perspective: Orientation Guide and Croatian Cultural Orientation: Zagreb, Dubrovnik. Split, Danube, Yugoslav, Slavic - Geography, History, Military, Religion, Catholicism, Traditions by Progressive Management
Cover of the book International Atomic Energy Agency's Decision to Find Iran in Non-Compliance, 2002-2006 (IAEA) - Nuclear Bargaining Leads to Referral to the UN Security Council after New Bomb Suspicions Emerge by Progressive Management
Cover of the book The Missile Plains: Frontline of America's Cold War - Historic Study, Minuteman Missile Site, South Dakota, plus the History of Ellsworth AFB and 28th Bomb Wing - Missiles and the Missileers by Progressive Management
Cover of the book Bureau of Reclamation Colorado River Dams and Water Projects: Colorado River Project, Dallas Creek Project, Glen Canyon Unit, Smith Fork Project - History, Construction by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy