Chuck Easttom

Last updated
Chuck Easttom
Born
William Easttom II

(1968-10-05) October 5, 1968 (age 56)
CitizenshipUnited States
Alma mater Capitol Technology University University of Portsmouth University of Texas El Paso Southeastern Oklahoma State University Northcentral University
Awards
  • Distinguished Speaker of the ACM
  • Distinguished Visitor of the IEEE
  • ACM Senior Member
  • IEEE Senior Member
Scientific career
Fields Cybersecurity Engineering Cryptography Quantum Computing Nanotechnology
Institutions Georgetown University
Thesis A Comparative Study Of Lattice Based Algorithms For Post Quantum Computing

William "Chuck" Easttom II (born October 5, 1968) is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering. [1]

Contents

Education

Chuck Easttom holds a B.A. from Southeastern Oklahoma State University, a M.Ed. from Southeastern Oklahoma State University, a master's degree in Applied Computer Science from Northcentral University [2] and a Masters in Systems Engineering from the University of Texas at El Paso, as well as a D.Sc. Doctor of Science in cyber security from Capitol Technology University [3] [4] [5] dissertation topic "A Comparative Study Of Lattice Based Algorithms For Post Quantum Computing", a Ph.D.Doctor of Philosophy in Technology focused on Nanotechnology [6] dissertation topic "The Effects of Complexity on Carbon Nanotube Failures", and a Ph.D.Doctor of Philosophy in Computer Science from University of Portsmouth [7] dissertation topic "A Systematic Framework for Network Forensics Using Graph Theory".

Professional work

In addition to computer security, Easttom has done work in software engineering., [8] [9] applied mathematics, quantum computing, and other areas. He has authored 42 books [10] on computer security, programming languages, Linux, cyber forensics, quantum computing, computer networks, penetration testing, and cryptography. His books are used as textbooks for both undergraduate and graduate programs at over 60 universities. [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] He is an inventor with 26 patented computer science inventions. [22] He is a frequent speaker at major cybersecurity conferences. [23] [24] [25] [26]

Easttom was part of the team that created the original CompTIA Security+ [27] and CompTIA Linux+ exams. He created the OSFCE (OSForensics Certified Examiner) course and test, [28] the EC Council Certified Encryption Specialist course and certification test, [29] and EC Council CAST Advanced Encryption course [30] as well as working on other EC-Council certifications [31]

Easttom has been involved in numerous IEEE standards. He is currently the Chair of IEEE P3123 - Artificial Intelligence and Machine Learning (AI/ML) Terminology and Data Formats Working Group, [32] a member of IEEE 2731 BCI unified terminology working group, [33] a former member (2017 to 2019) of IEEE Software & Systems Engineering Standards Committee. Working on the DevOps 2675, [34] a member of IEEE P2995 - Trial-Use Standard for a Quantum Algorithm Design and Development Standards Group, [35] and Vice Chair IEEE P23026 - Systems and Software Engineering -- Engineering and Management of Websites for Systems, Software, and Services Information [36]

Chuck Easttom has been interviewed regarding cyber security topics by CNN Money [37] and CBS Smart Planet, [38] and other media outlets, [39] [40] [41] [42] [43] [44] [45] and He has been named a Distinguished Speaker of the ACM [46] and a Distinguished Visitor of the IEEE. [47] He is also a Senior member of the IEEE [48] and Senior member of the ACM. [49]

Easttom was Editor in Chief for the American Journal of Science and Engineering from 2018 to 2022. [50] He was also the director of the Quantum Computing and Cryptography Lab at Capitol Technology University, [51] from 2019 to 2022 he was an adjunct professor for the University of Dallas, [52] he is currently an adjunct lecturer for Georgetown University [53] and an adjunct professor for Vanderbilt University. [54]

Chuck Easttom lives in Plano Texas [55] with his wife Teresa.

Books

Easttom has authored 42 computer science books. These include:

Related Research Articles

<span class="mw-page-title-main">Computing</span> Activity involving calculations or computing machinery

Computing is any goal-oriented activity requiring, benefiting from, or creating computing machinery. It includes the study and experimentation of algorithmic processes, and the development of both hardware and software. Computing has scientific, engineering, mathematical, technological, and social aspects. Major computing disciplines include computer engineering, computer science, cybersecurity, data science, information systems, information technology, and software engineering.

Frank Thomson "Tom" Leighton is an American mathematician who is the CEO of Akamai Technologies, the company he co-founded with the late Daniel Lewin in 1998. Leighton discovered a solution to free up web congestion using applied mathematics and distributed computing. Under his leadership, Akamai has evolved from its origins as a content delivery network (CDN) into the world's most distributed cloud platform, with leading solutions for content delivery, cybersecurity, and cloud computing.

<span class="mw-page-title-main">Willy Susilo</span> Australian computer scientist

Willy Susilo is an Australian cybersecurity scientist and cryptographer. He is a Distinguished Professor at the School of Computing and Information Technology, Faculty of Engineering and Information Sciences University of Wollongong, Australia.

<span class="mw-page-title-main">UNSW School of Computer Science and Engineering</span>

The UNSW School of Computer Science and Engineering (CSE) is part of the UNSW Faculty of Engineering and was founded in 1991 out of the former Department of Computer Science within the School of Electrical Engineering and Computer Science. It is the highest ranked and largest School of its kind in Australia. The academic staff have research focus in areas such as Artificial Intelligence, Biomedical Image Computing, Data Knowledge, Embedded Systems, Networked Systems and Security, Programming Languages and Compilers, Service Oriented Computing, Theoretical Computer Science and Trustworthy Systems.

Informatics is the study of computational systems. According to the ACM Europe Council and Informatics Europe, informatics is synonymous with computer science and computing as a profession, in which the central notion is transformation of information. In some cases, the term "informatics" may also be used with different meanings, e.g. in the context of social computing, or in context of library science.

The Computing Technology Industry Association, more commonly known as CompTIA, is an American non-profit trade association that issues professional certifications for the information technology (IT) industry. It is considered one of the IT industry's top trade associations.

Carl E. Landwehr is an American computer scientist whose research focus is cybersecurity and trustworthy computing. His work has addressed the identification of software vulnerabilities toward high assurance software development, architectures for intrusion-tolerant and multilevel security systems, token-based authentication, and system evaluation and certification methods. In an invited essay for ACSAC 2013, he proposed the idea of developing building codes for building software that is used in critical infrastructures. He has organized an NSF funded workshop to develop a building code and research agenda for medical device software security. The final committee report is available through the Cyber Security and Policy Institute of the George Washington University, and the building code through the IEEE.

A Master of Science in Cyber Security is a type of postgraduate academic master's degree awarded by universities in many countries. This degree is typically studied for in cyber security. What is offered by many institutions is actually called a Master in Strategic Cyber Operations and Information Management (SCOIM) which is commonly understood to be a Master in Cybersecurity. This degree is offered by at least some universities in their Professional Studies program so that it can be accomplished while students are employed - in other words it allows for "distance learning" or online attendance. Requirements for the Professional Studies program include: 3.0 or better undergrad GPA, professional recommendations letters and an essay.

The Global Cyber Security Hall of Fame, founded by Larry Letow and Rick Geritz, was established in 2012 to recognize the contributions of key individuals in the field of cyber security; its mission statement is, Respect the Past – Protect the Future. According to its website, it is designed to honor the innovative individuals and organizations which had the vision and leadership to create the fundamental building blocks for the cybersecurity Industry. The organization also highlights major milestones in the industry's 40-year history through a timelineArchived 2013-12-30 at the Wayback Machine representation, which includes inductees and their corresponding accomplishments.

Active defense can refer to a defensive strategy in the military or cybersecurity arena.

This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.

<span class="mw-page-title-main">Department of Computer Science of TU Darmstadt</span> Department of Computer Science of the Technische Universität Darmstadt

The Department of Computer Science is a department of the Technische Universität Darmstadt. With a total of 36 professorships and about 3,700 students in 12 study courses, the Department of Computer Science is the largest department of the university. The department shapes the two research profile areas "Cybersecurity (CYSEC)" and "Internet and Digitization (InDi)" of the university.

Nancy Rose Mead is an American computer scientist. She is known for her contributions to security, software engineering education and requirements.

Edward G. Amoroso is an American computer security professional, entrepreneur, author, and educator based in the New York City area. His research interests have centered on techniques and criteria for measuring trustworthy software development. the application of these methods to secure software development for critical projects in the defense and aerospace industries, and redefining trust parameters for improved security in the cloud.

Ali Dehghantanha is an academic-entrepreneur in cybersecurity and cyber threat intelligence. He is a Professor of Cybersecurity and a Canada Research Chair in Cybersecurity and Threat Intelligence.

Houbing Herbert Song is the Co-Editor-in-Chief for IEEE Transactions on Industrial Informatics (TII) and the Director of the Security and Optimization for Networked Globe Laboratory at the University of Maryland, Baltimore County in Baltimore, USA. He received a Ph.D. degree in Electrical Engineering from the University of Virginia in 2012.

References

  1. "William (Chuck) Easttom II | Pearson IT Certification". www.pearsonitcertification.com. Retrieved 2024-02-16.
  2. "Northcentral University Alumni".
  3. "Secure World Speaker Bio".
  4. "Keynote Speakers Bio".
  5. "Easttom: in cyber war, malware is "the weapon of choice"".
  6. "Faculty Bio".
  7. "Chuck Easttom". Amazon.
  8. "EC Council CASE Java". YouTube . November 2018.
  9. "Computer Programming Course Syllabus" (PDF).
  10. "Speaker Bio".[ permanent dead link ]
  11. "CS 511 digital forensics" (PDF).
  12. "CCT 121 Computer Crime Investigation".
  13. "CIS 4345, CRN 80042, Network and Systems Security" (PDF).
  14. "CIS 4385 Cybercrime Detection and Digital Forensics".
  15. "TCOM/CFRS 661 Digital Media Forensics" (PDF).
  16. "CSCE 201 Introduction to Computer Security".
  17. "ACST 3530 - Linux Operating Systems and Networking".
  18. "COMT 36330 LAN Security Fundamentals".
  19. "CSCI: Principles and Practices of Cybersecurity".
  20. "ISSC630: Advanced Cybercrime Analysis" (PDF).
  21. "CNT 4104 Software Project in Computer Networks".
  22. "United States Patent Office".
  23. "Hacker Halted". 2017-01-18.
  24. "Secure World".
  25. "ISC2 Security Congress".
  26. "DEFCON".
  27. "CompTIA Security+ SME List". 2016-02-09.
  28. "OSForensics Training".
  29. "ECES". YouTube . 3 July 2017.
  30. "Author Bio".[ permanent dead link ]
  31. "EC Council Certified Application Security Engineer" . Retrieved 20 November 2018.
  32. "IEEE P3123".
  33. Easttom, C.; Bianchi, L.; Valeriani, D.; Nam, C. S.; Hossaini, A.; Zapala, D.; Roman-Gonzalez, A.; Singh, A. K.; Antonietti, A.; Sahonero-Alvarez, G.; Balachandran, P. (2021). "IEEE 2731". IEEE Open Journal of Engineering in Medicine and Biology. 2: 91–96. doi:10.1109/OJEMB.2021.3057471. PMC   8901026 . PMID   35402984.
  34. "Pearson Bio".
  35. "IEEE P2995". Archived from the original on February 24, 2022.
  36. "IEEE P23026". Archived from the original on February 23, 2022.
  37. "Unhackable Code".
  38. "NSA proof products: protective or a profit motive?".
  39. "What the JPMorgan Chase Breach Teaches Us".
  40. "Hackers infiltrate Web site".
  41. "Interview With Chuck Easttom, Computer Scientist & Consultant".
  42. "Steps Executives Can Take to Fight Fraud".
  43. "Generating Cryptographic Keys: Will Your Random Number Generators (PRNGs) Do The Job?".[ permanent dead link ]
  44. "Speaker Bio" (PDF).
  45. "Forensic Focus".
  46. "ACM Distinguished Speaker".
  47. "Chuck Easttom | IEEE Computer Society". 16 January 2020. Retrieved 2020-11-09.
  48. "IEEE Senior Member". 2019-05-06.
  49. "ACM Senior Member".
  50. "American Journal of Science and Engineering".
  51. "Quantum Computing and Cryptography Research Lab".
  52. "University of Dallas Faculty Page".
  53. "Georgetown Faculty Page".
  54. Easttom, Chuck (2022). "Basic Information Theory". Modern Cryptography. Springer. pp. 51–73. doi:10.1007/978-3-031-12304-7_3. ISBN   9783031123047.
  55. https://www.jissec.org/Contents/V13/N3/V13N3-Easttom.html. {{cite web}}: Missing or empty |title= (help)