The Information Age is fast becoming the age
of the zero-day vulnerability, the kind of
holes in software that allow attackers get in
to steal, destroy, or manipulate data. As a measure
of global Internet security, the number of zero days
is perhaps a better metric than attempted attacks
on a target, and the trend line is worrisome.
In 2015, researchers discovered a new zero-day
flaw about every week. That was about double the
number found in 2014, which was about double
the number found in 2013, according to research
from Symantec, the cybersecurity company.
The average lifespan of a zero day — that is,
how long it remains an effective attack route — is
more than six years, RAND Corporation analysts
have found. But finding or developing a zero-day
exploit took an average of just a month. Bottom
line: the number of new exploits is skyrocketing,
and while they take about a month to make, they
can live longer than some household pets.
For the Department of Defense, zero-day
exploits have become part of information
warfare. What America’s cyber warriors
discover today about stopping (or in some cases
exploiting) these flaws may go on to change the
way we all use the Internet.
This book will look at the Pentagon’s cuttingedge
cyber tools and capabilities for defending
and attacking networks in the age of the zero day.
It will explore how new tactics and hacks are
changing defense for leaders and even soldiers in
conflict zones. This collection of articles will also
look at tough policy, acquisition and management
choices ahead for defense leaders and policymakers
working to secure the U.S. edge in cyber
security in the new landscape of insecurity.
Source: Defence One