Skip to content

Latest commit

 

History

History
69 lines (52 loc) · 6.58 KB

3_vulnerabilities_contents.md

File metadata and controls

69 lines (52 loc) · 6.58 KB

Module 3. The Vulnerability and Exploit Markets

CC BY-NC-SA 4.0

This module of the course on Cybercrime, Cyberespionage and Cyberconflicts examines the topic of software vulnerabilites, their associated exploits, and the role they play in the cyberarms industry. The module first provides some foundational definitions on how vulnerabilities are numbered (CVE) and scored (CVSS). It then discusses the notion of zero-day vulnerability and the white/gray/black industries that emerged around them -- notably vulnerability reward ("bug bounty") programs and clandestine markets. Some key ideas about the dynamics of zero-day vulnerabilities are discussed using a 2017 RAND report that analyzes the life statuses, longevity, collision rate, and costs of a dataset of 200 0-day exploits spanning 14 years. The module concludes with an overview of the ethical conundrums of vulnerability -- and computer security -- research.

Learning Outcomes

  • Understand the information available in a CVE entry.
  • Know the CVSS scoring rubrics and how to use them.
  • Know the lifecycle and markets for zero-day vulnerabilities and associated exploits.
  • Recognize and discuss the ethical challenges related to vulnerabilities and exploits due to their potential for harm.

Contents and Readings

Slides

The slides used in class for this module are available here.

Questions

The list of questions for this module are available here.

Further Reading