Show simple item record

dc.contributor.advisorRowe, Neil
dc.contributor.authorHall, Carissa G.
dc.dateDec-17
dc.date.accessioned2018-02-07T20:37:32Z
dc.date.available2018-02-07T20:37:32Z
dc.date.issued2017-12
dc.identifier.urihttp://hdl.handle.net/10945/56933
dc.descriptionApproved for public release; distribution is unlimiteden_US
dc.description.abstractA cyberweapon is weaponized software code that exploits flaws in software. It is only effective if the flaw still exists at the time of weapon deployment. Because of this, there is only a small window of time in which a particular cyberweapon can be used. Many argue that cyberweapons can only be effectively used once, and that after first use, the vulnerability will be patched. However, the target must first detect the attack, find the vulnerability that was exploited, reverse-engineer the cyberweapon to identify signatures, then create and implement a patch. This window of opportunity between attack detection and patch implementation allows an attacker to reuse the cyberweapon against different or even the same targets as long as the window of opportunity remains open. An attacker can increase the length of time the window remains open by obfuscating the cyberweapon's signatures to make it harder to detect the attack or by making it harder to locate and remove the weapon. This can be accomplished by incorporating survivability into the weapon's design requirement. This thesis explores the strategic implications of reusable cyberweapons by specifically looking at stealth as the critical attribute that allows a cyberweapon to go undetected and survive long enough to be effectively used more than once.en_US
dc.description.urihttp://archive.org/details/timesensitivityi1094556933
dc.publisherMonterey, California: Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleTime sensitivity in cyberweapon reusabilityen_US
dc.typeThesisen_US
dc.contributor.secondreaderHuntley, Wade
dc.contributor.departmentInformation Sciences (IS)
dc.subject.authorcyberweaponsen_US
dc.subject.authorcyberweapon reusabilityen_US
dc.description.serviceLieutenant, United States Navyen_US
etd.thesisdegree.nameMaster of Science in Cyber Systems and Operationsen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineCyber Systems and Operationsen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record