Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9780463562703
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9780463562703
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

A cyberweapon is weaponized software code that exploits flaws in software. It is only effective if the flaw still exists at the time of weapon deployment. Because of this, there is only a small window of time in which a particular cyberweapon can be used. Many argue that cyberweapons can only be effectively used once, and that after first use, the vulnerability will be patched. However, the target must first detect the attack, find the vulnerability that was exploited, reverse-engineer the cyberweapon to identify signatures, then create and implement a patch. This window of opportunity between attack detection and patch implementation allows an attacker to reuse the cyberweapon against different or even the same targets as long as the window of opportunity remains open. An attacker can increase the length of time the window remains open by obfuscating the cyberweapon's signatures to make it harder to detect the attack or by making it harder to locate and remove the weapon. This can be accomplished by incorporating survivability into the weapon' s design requirement. This thesis explores the strategic implications of reusable cyberweapons by specifically looking at stealth as the critical attribute that allows a cyberweapon to go undetected and survive long enough to be effectively used more than once.

I. INTRODUCTION * A. OVERVIEW * B. SIGNIFICANCE OF A REUSABLE CYBERWEAPON * II. RELATED RESEARCH * A. OVERVIEW * B. DEFINING CYBERWEAPONS * 1. Classifying Types of Cyberweapons * C. VULNERABILITY LIFE CYCLE * 1. Discovering Vulnerabilities * 2. Reporting Vulnerabilities * 3. Patching Vulnerabilities * D. THE DEBATE ON PUBLIC DISCLOSURE * E. PERISHABILITY OF CYBERWEAPONS * 1. Risk of Rediscovery * F. TIMING THE USE OF CYBERWEAPONS * III. REUSABILITY * A. OVERVIEW * B. MALWARE SIGNATURES * C. NEGLIGENCE * 1. Unpatched Systems * 2. Outdated Antivirus Software * 3. Publicly Known Vulnerabilities * 4. The Human Element * D. PERSISTENCE * 1. Memory-Resident Malware * 2. Fileless Malware * 3. Supply Chain Manipulation * E. VARIATIONS * 1. Encryption and Packing * 2. Polymorphic and Metamorphic Malware * IV. STRATEGIC IMPLICATIONS OF A REUSABLE CYBERWEAPON * A. OVERVIEW * B. SURVIVABILITY * 1. Applying Survivability to Cyberweapons * 2. Deception and Concealment of Cyberweapons * C. DESIGNING A SURVIVABLE CYBERWEAPON * 1. Determining Probability of Mission Success * 2. Determining Measure of Effectiveness over Time * V. CONCLUSION * A. OVERVIEW * B. POLICY RECOMMENDATIONS * 1. The Benefits of a Reusable Cyberweapon * 2. The Debate on Cyberweapon Stockpiling * 3. Title 10 and Title 50 Policy Discussion * C. FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

A cyberweapon is weaponized software code that exploits flaws in software. It is only effective if the flaw still exists at the time of weapon deployment. Because of this, there is only a small window of time in which a particular cyberweapon can be used. Many argue that cyberweapons can only be effectively used once, and that after first use, the vulnerability will be patched. However, the target must first detect the attack, find the vulnerability that was exploited, reverse-engineer the cyberweapon to identify signatures, then create and implement a patch. This window of opportunity between attack detection and patch implementation allows an attacker to reuse the cyberweapon against different or even the same targets as long as the window of opportunity remains open. An attacker can increase the length of time the window remains open by obfuscating the cyberweapon's signatures to make it harder to detect the attack or by making it harder to locate and remove the weapon. This can be accomplished by incorporating survivability into the weapon' s design requirement. This thesis explores the strategic implications of reusable cyberweapons by specifically looking at stealth as the critical attribute that allows a cyberweapon to go undetected and survive long enough to be effectively used more than once.

I. INTRODUCTION * A. OVERVIEW * B. SIGNIFICANCE OF A REUSABLE CYBERWEAPON * II. RELATED RESEARCH * A. OVERVIEW * B. DEFINING CYBERWEAPONS * 1. Classifying Types of Cyberweapons * C. VULNERABILITY LIFE CYCLE * 1. Discovering Vulnerabilities * 2. Reporting Vulnerabilities * 3. Patching Vulnerabilities * D. THE DEBATE ON PUBLIC DISCLOSURE * E. PERISHABILITY OF CYBERWEAPONS * 1. Risk of Rediscovery * F. TIMING THE USE OF CYBERWEAPONS * III. REUSABILITY * A. OVERVIEW * B. MALWARE SIGNATURES * C. NEGLIGENCE * 1. Unpatched Systems * 2. Outdated Antivirus Software * 3. Publicly Known Vulnerabilities * 4. The Human Element * D. PERSISTENCE * 1. Memory-Resident Malware * 2. Fileless Malware * 3. Supply Chain Manipulation * E. VARIATIONS * 1. Encryption and Packing * 2. Polymorphic and Metamorphic Malware * IV. STRATEGIC IMPLICATIONS OF A REUSABLE CYBERWEAPON * A. OVERVIEW * B. SURVIVABILITY * 1. Applying Survivability to Cyberweapons * 2. Deception and Concealment of Cyberweapons * C. DESIGNING A SURVIVABLE CYBERWEAPON * 1. Determining Probability of Mission Success * 2. Determining Measure of Effectiveness over Time * V. CONCLUSION * A. OVERVIEW * B. POLICY RECOMMENDATIONS * 1. The Benefits of a Reusable Cyberweapon * 2. The Debate on Cyberweapon Stockpiling * 3. Title 10 and Title 50 Policy Discussion * C. FUTURE RESEARCH

More books from Progressive Management

Cover of the book Drone Wars, Strikes and Targeted Killing of al Qaeda Terrorists: President Obama's Speech on Counterterrorism Strategy, Guantanamo, Hearings on Drone Policy Effectiveness and Constitutionality by Progressive Management
Cover of the book Paradigm Lost: Rethinking Theater Airlift to Support the Army After Next - Cargo Handling Capability, Situational Awareness, Defensive Systems, C-130, C-17, CH-47D, V-22 Osprey, Austere Operations by Progressive Management
Cover of the book Setup: What the Air Force Did in Vietnam and Why - Thoughts of Atomic Weapons, Bombing and Diplomacy, Linebacker, Laos and Cambodia, Mayaguez by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Apollo 15 Technical Crew Debriefing with Unique Observations about the Fourth Lunar Landing - Astronauts Scott, Irwin, Worden by Progressive Management
Cover of the book The Role of Federal Military Forces in Domestic Disorders 1945-1992: Riots, Civil Rights, Vietnam War Demonstrations, Kent State, Martin Luther King, March on Washington, Kennedy and Johnson by Progressive Management
Cover of the book 2012 Republican Vice Presidential Candidate Paul Ryan: Issue Statements, Speeches, Thoughts and Policies, Complete Path to Prosperity Federal Budget Plans with Proposed Changes to Medicare and Taxes by Progressive Management
Cover of the book 21st Century Charcot-Marie-Tooth Disorder (CMT) Sourcebook: Clinical Data for Patients, Families, and Physicians - Hereditary Motor and Sensory Neuropathy (HMSN) by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: The United States Army Functional Concept for Intelligence - TRADOC 525-2-1, Full-Spectrum Operations, Cyber, WMD, Entry (Professional Format Series) by Progressive Management
Cover of the book Sustaining Unconventional Warfare - Conventional Support for Special Operations Command (SOCOM) Forces, Case Studies of Historical Operations in France and Greece, Brigade Combat Teams (BCT) by Progressive Management
Cover of the book Next-Generation Microbiological Requirements for Space Flight: Human Research Program, Space Human Factors & Habitability - Pathogens, Potable Water, Life Sciences, Manned Mars Missions by Progressive Management
Cover of the book Preparing for the Future: The Regional Alignment of U.S. Army Brigade Combat Teams (BCTs) - Capacity Building, Alliance Building, Lessons Learned, Joint Doctrine, Strategy and Tactics by Progressive Management
Cover of the book The End of the Beginning: On the Application of Aerospace Power in an Age of Fractured Sovereignty, Trends 2020, Demography, Technology, Military, Social, Operations with Blurred Boundaries by Progressive Management
Cover of the book On the Far Bank: The Effects of Gap Crossing on Operational Reach - Studies of Three Large-scale, Opposed River Crossings in World War II and Arab-Israeli War: Operations Market Garden, Plunder, Badr by Progressive Management
Cover of the book Strategic Attack of National Electrical Systems: Generation, Transmission, Distribution, Past Attacks in World War II Germany and Japan, U.S. Strategic Bombing Survey, Korea, Vietnam, Desert Storm by Progressive Management
Cover of the book Democratic Republic of the Congo (DRC) in Perspective - Orientation Guide: Geography, History, Cities, Economy, Society, Security, Military, Religion, Traditions, Mobutu Era, Congo Wars, Hazards by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy