Insights into the World
of Hacker Economics

It won’t be long before the number of connected devices outnumbers the number of connected people by a vast margin. With every additional connection, the opportunity for network-based business and economic growth increases. Unfortunately, so does the risk of cybercrime. The new, connected world is a magnet for criminals and driving a boom in cybercrime tools and stolen data.

Today, the cybercrime black market has the potential to be more profitable than the international drug trade. But, in comparison to narcotics, cybercrime is less risky, has a lower barrier to entry and worldwide distribution is nearly guaranteed. No wonder the impact of cybercrime on information security, safety and finances is a serious concern for any business, government or individual.

Cybercrime works its stealthy way through a variety of channels that span multiple access tiers. Activities range from outright stealing to compromising financial data and accounts, e-commerce and social media credentials to intellectual property theft and denial of service1. Though law enforcement has seen some successful takedowns, more often the publicity surrounding most cybercrime arrests does more to highlight the opportunities provided by the black market than to dissuade cybercrime. With every story about law enforcement’s investigative techniques, hackers increase their skill set. Every news story about the dollar value of the latest data heist provides fuel for the next attack.

Disrupting the Cybercrime Supply Chain

With such a low barrier to entry, the proliferation of hackers will soon outpace business and government defenses. If we want to effectively disrupt the cybercrime market, we need to make cybercrime both less lucrative and more difficult.

Intrusion Deception

New threats demand a new approach. As a means of actively defending against a system attack, Juniper has introduced solutions featuring Intrusion Deception. These solutions slow down an attacker by setting up tripwires that neutralize the attack, while also collecting intelligence about his identity that can be used to block his device from the network. Intrusion Deception disrupts the economics of cybercrime by making attacks more cumbersome, time intensive and expensive. It’s the first step towards changing the market drive and, ultimately, the economic value of an attack.

The Future of Cybercrime

Of course, Intrusion Deception is just one element to combating cybercrime. Stronger, more secure networks will dissuade hackers from attempting an attack in the first place. No matter the approach you take, one thing is certain: the threat of cybercrime continues to rise. Aggressively planning for an attack and taking swift actions once an intruder is detected will be key to your organization’s survival.

1. The Rand Corporation. Markets for Cybercrime Tools and Stolen Data: Hackers’ Bazaar. 2014

HOW JUNIPER CAN HELP

Juniper Security

Whether it’s securing the mobile workforce, the virtualized data center, complex applications, or the distributed enterprise, security has never been more challenging or important. Juniper Networks can help you balance security with access to network resources, information sharing and remote connectivity. Our end-to-end security solutions help you connect, protect and manage across your entire network infrastructure, from the endpoint device all the way to the data center, so you’re in total control.

Read more about Juniper Networks solutions for Juniper Security.Connect to Sales

Net News

Mobility

Whether you're a service provider with millions of customers or a large enterprise enabling thousands of employees, mobility is at the heart of every challenge, opportunity and necessity facing your business today.


Security

The rise of social networks have given cyber-criminals a new way to wreak havoc on network security, but it’s hardly the only trend threatening your business. There’s the myths and realities of cloud security to be sorted through, plus the proliferation of new platforms and devices.


Software

When it comes to technology, consumers are spoiled. They take for granted the simple but powerful applications they encounter on the Internet, and expect their enterprise apps to act the same way.


The Internet of Things

The phrase “everything’s connected” has never been more true or measurable than now. The amount of devices connected to the Internet will soon exceed the number of people connected, and the opportunities presented by this constant flow of information are endless.


Virtualization and the Cloud

Everyone’s talking about the cloud because, frankly, everyone needs it. The opportunity to access and create content remotely cannot be ignored, nor can the ease of scaling that allows enterprises to tap into more server farms whenever they’re needed.


Web of Services

As the demands of the masses grow, more services have migrated online to meet them, creating incredible opportunities for even “the little guys” to access trends and big data once reserved for large enterprises.


Wireless LAN

Going wireless is not just about keeping down IT costs; it’s about taking advantage of the proliferation of mobile computing devices among your workers, vendors and colleagues to unleash unprecedented levels of productivity.