Gregory Falco | |
---|---|
Nationality | American |
Occupation(s) | Inventor and researcher |
Academic background | |
Alma mater | Massachusetts Institute of Technology |
Academic work | |
Discipline | Aerospace,Cybersecurity |
Gregory Falco is an American inventor and researcher. Falco is a professor at Cornell University. He is a pioneer in the field of cybersecurity research and its aerospace applications. Falco is the founding chair of IEEE's Standard for Space System Cybersecurity.
Falco earned his B.S. from Cornell University in 2010,M.S. from Columbia University in 2012. and Ph.D.,from the Massachusetts Institute of Technology in 2018. He completed a predoctoral fellowship with the Cyber Security Project at Harvard University. His postdoctoral research was conducted at the Computer Science and Artificial Intelligence Laboratory (CSAIL) at Massachusetts Institute of Technology and at the Cyber Policy Center at Stanford University. Falco's PhD was funded by NASA's Jet Propulsion Laboratory to develop an AI system to automatically enumerate threats to space mission systems. [1]
He began his career at Accenture where he was an executive in the Strategy &Sustainability practice. While at Accenture,he lectured at Columbia University and taught a course on Smart Cities and the Evolution of Sustainability. [2] [3]
In 2016 Falco co-founded the company NeuroMesh Inc. while at the Massachusetts Institute of Technology. [4] He was listed in Forbes 30 Under 30 in Enterprise Technology for contributions to industrial control security with his company,acquired by Meta Platforms in 2022. [5]
In 2021,Falco joined the faculty at Johns Hopkins University as an assistant professor at their Institute for Assured Autonomy. [6] [7] [8] [9] Falco directed the Aerospace ADVERSARY Laboratory at Johns Hopkins University. [10]
In 2023,Falco joined the faculty at Cornell University as an assistant professor in the Sibley School of Mechanical and Aerospace Engineering and Systems Engineering. [11]
Falco's main area of work is aerospace security research. [12] [13] [14]
In 2018,his paper Cybersecurity Principles for Space Systems, which included recommendations to reduce the cyber risk of the emergent commercial space sector and informed the United States Space Policy Directive-5,was published in the Journal of Aerospace Information Systems. [15] His work on the topic titled Job One For Space Force:Space Asset Cybersecurity was published by Harvard's Belfer Center. [16] [17]
In 2022,he published a monograph co-authored with Eric Rosenbach on cyber risk management titled Confronting Cyber Risk:An Embedded Endurance Strategy for Cybersecurity. [18] He was awarded a DARPA Young Faculty Award for his project Orbital Resilient Blockchain Interagent Transaction Service (ORBITS) Architecture:A Resilient,Zero-Trust Architecture for Hosted Payloads and Space Infrastructure as a Service. [19] [20] Falco is a member of the Space Systems Critical Infrastructure Working Group hosted by Cybersecurity and Infrastructure Security Agency. [21]
In 2023,Falco was named the founding chair of the Standard for Space Systems Cybersecurity by the IEEE Standards Association. [22] [23] Falco discussed the 2023 Chinese balloon incident as an aerospace security expert with BBC News,Bloomberg News,Australian Broadcasting Corporation,Channel 4 and Vice Media. [24] [25] [26] [27] His paper WannaFly:An Approach to Satellite Ransomware, the first public documentation for how to ransomware a space vehicle,was published in the 2023 IEEE 9th International Conference on Space Mission Challenges for Information Technology. [28]
Computer security,cybersecurity,digital security or information technology security is the protection of computer systems and networks from attacks by malicious actors that may result in unauthorized information disclosure,theft of,or damage to hardware,software,or data,as well as from the disruption or misdirection of the services they provide.
The Defense Advanced Research Projects Agency (DARPA) is a research and development agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military.
The Mitre Corporation is an American not-for-profit organization with dual headquarters in Bedford,Massachusetts,and McLean,Virginia. It manages federally funded research and development centers (FFRDCs) supporting various U.S. government agencies in the aviation,defense,healthcare,homeland security,and cybersecurity fields,among others.
SpiderOak Inc. is a US-based software company focused on satellite cybersecurity.
A cyberattack is any offensive maneuver that targets computer information systems,computer networks,infrastructures,personal computer devices,or smartphones. An attacker is a person or process that attempts to access data,functions,or other restricted areas of the system without authorization,potentially with malicious intent. Depending on the context,cyberattacks can be part of cyber warfare or cyberterrorism. A cyberattack can be employed by sovereign states,individuals,groups,societies or organizations and it may originate from an anonymous source. A product that facilitates a cyberattack is sometimes called a cyber weapon. Cyberattacks have increased over the last few years. A well-known example of a cyberattack is a distributed denial of service attack (DDoS).
Carl E. Landwehr is an American computer scientist whose research focus is cybersecurity and trustworthy computing. His work has addressed the identification of software vulnerabilities toward high assurance software development,architectures for intrusion-tolerant and multilevel security systems,token-based authentication,and system evaluation and certification methods. In an invited essay for ACSAC 2013,he proposed the idea of developing building codes for building software that is used in critical infrastructures. He has organized an NSF funded workshop to develop a building code and research agenda for medical device software security. The final committee report is available through the Cyber Security and Policy Institute of the George Washington University,and the building code through the IEEE.
William Johnston BuchananOBE FBCS CEng PFHEA is a Scottish computer scientist. Buchanan is a professor in the School of Computing,Engineering and the Built Environment. He currently leads the Blockpass ID Lab and the Centre for Cybersecurity,IoT and Cyberphysical at Edinburgh Napier University. In 2017,he was appointed Officer of the Order of the British Empire (OBE) in the 2017 Birthday Honours for services to cyber security.
The Indian Computer Emergency Response Team is an office within the Ministry of Electronics and Information Technology of the Government of India. It is the nodal agency to deal with cyber security incidents. It strengthens security-related defence of the Indian Internet domain.
OPS-SAT is a CubeSat by the European Space Agency (ESA) and it is intended to demonstrate the improvements in mission control capabilities that will arise when satellites can fly more powerful on-board computers. The mission has the objective to break the cycle of "has never flown,will never fly" in the area of satellite control. It was the first CubeSat operated directly by ESA.
Salvatore J. Stolfo is an academic and professor of computer science at Columbia University,specializing in computer security.
Stephen Joseph Lukasik was an American physicist who served in multiple high-level defense and scientific related positions for advancing the technologies and techniques for national defense and the detection and control of diverse types of weapons of mass destruction,especially nuclear devices. He was the second longest serving Director of DARPA - the Defense Advanced Research Projects Agency –during which numerous new technologies including packet and internet protocols were developed. He was also the first chief scientist of the Federal Communications Commission where he created its Office of Science and Technology and which facilitated the commercial deployment of new technology that included spread spectrum technology.
The People's Liberation Army Strategic Support Force is the space,cyber,political,and electronic warfare force and the 5th branch of the People's Liberation Army (PLA). It was established in December 2015 as part of the first wave of the Chinese military reforms.
The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity and infrastructure protection across all levels of government,coordinating cybersecurity programs with U.S. states,and improving the government's cybersecurity protections against private and nation-state hackers.
Raheem Beyah is an American computer engineer,researcher,and educator. As of January 15,2021 he is the Dean of the College of Engineering and Southern Company Chair at the Georgia Institute of Technology. Prior to becoming the Dean,he was the vice president for Interdisciplinary Research and the Motorola Foundation Professor and the executive director of Georgia Tech's online masters in cyber security program. Beyah is also the co-founder and chair of industrial security company Fortiphyd Logic,Inc.
Edward G. Amoroso is an American computer security professional,entrepreneur,author,and educator based in the New York City area. His research interests have centered on techniques and criteria for measuring trustworthy software development. the application of these methods to secure software development for critical projects in the defense and aerospace industries,and redefining trust parameters for improved security in the cloud.
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings,called "flags",which are secretly hidden in purposefully-vulnerable programs or websites. They can be used for both competitive or educational purposes. In two main variations of CTFs,participants either steal flags from other participants or from organizers. A mixed competition combines these two styles. Competitions can include hiding flags in hardware devices,they can be both online or in-person,and can be advanced or entry-level. The game is inspired by the traditional outdoor sport of the same name.
Prashant Pillai is an Indian-born British computer scientist. He is the Pro Vice-Chancellor for Research and Knowledge Exchange at the University of Wolverhampton,UK. He was previously the Associate Dean for Research and Knowledge Exchange and Professor of Cyber Security at the University of Wolverhampton. He is also the Director of Cyber Quarter - Midlands Centre for Cyber Security. He specialises in security and privacy for communication networks. Pillai has led several national/international research projects in the areas of networking protocols and cyber security. He has been invited for talks at various international conferences and has published over 100 papers within peer-reviewed journals and conferences.
The IT Army of Ukraine is a volunteer cyberwarfare organisation created at the end of February 2022 to fight against digital intrusion of Ukrainian information and cyberspace after the beginning of the Russian invasion of Ukraine on February 24,2022. The group also conducts offensive cyberwarfare operations,and Chief of Head of State Special Communications Service of Ukraine Victor Zhora said its enlisted hackers would only attack military targets.
The U.S. Ransomware Task Force (RTF),also known as the Joint Ransomware Task Force,is an interagency body that leads the American government's efforts to address the threats of ransomware attacks. It is jointly headed by the Department of Homeland Security’s cyber arm,the Cybersecurity and Infrastructure Security Agency (CISA),and the Federal Bureau of Investigation.
Over the years,the U.S. Defense Advanced Research Projects Agency (DARPA) has conducted a number of prize competitions to spur innovations. A prize competition allows DARPA to establish an ambitious goal,which makes way for novel approaches from the public that might otherwise appear too risky to undertake by experts in a particular discipline.
{{cite web}}
: CS1 maint: numeric names: authors list (link){{cite book}}
: CS1 maint: location missing publisher (link)