Michael Gregg

Last updated

Michael Gregg is an American computer security specialist, businessman, [1] author and co-author , some of his books include; Build Your Own Network Security Lab and Inside Network Security Assessment. [2] He has also served as an expert witness before a congressional committee on cyber security and identity theft. [3]

Contents

Career

Gregg holds two associate degrees, a bachelor's degree and a master's degree. [4]

He has been quoted in newsprint and featured on various television and radio shows, including NPR, The New York Times, ABC, CBS, [5] Fox TV [6] and others discussing cybersecurity and ethical hacking.

He is the lead faculty member for Villanova University's online Cyber Security program. [7]

He also holds several certifications, including MCSE, MCT, CTT, A+, N+, CNA, CCNA, CIW Security Analyst, and TICSA. [8]

Publications

Gregg has contributed to the following published works:

Gregg has written articles for print and Internet publications such as:

Related Research Articles

<span class="mw-page-title-main">SANS Institute</span> American security company

The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.

CISSP is an independent information security certification granted by the International Information System Security Certification Consortium, also known as ISC2.

Internet Relay Chat Flooding/Scrolling on an IRC network is a method of disconnecting users from an IRC server, exhausting bandwidth which causes network latency ('lag'), or just disrupting users. Floods can either be done by scripts or by external programs.

Rizon is an Internet Relay Chat (IRC) network. The IRC network itself ranks number 5 among the largest IRC networks. Rizon is popular with many anime fansubbing groups who work online, many of whom provide their content through XDCC via IRC bots in their distribution channels. It is also used by many users of eRepublik as a means of communication. File sharing of other copyrighted material such as Warez is also common in some channels on the network.

A security hacker or security researcher is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

Certified Ethical Hacker (CEH) is a qualification given by EC-Council and obtained by demonstrating knowledge of assessing the security of computer systems by looking for vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. This knowledge is assessed by answering multiple choice questions regarding various ethical hacking techniques and tools. The code for the CEH exam is 312–50. This certification has now been made a baseline with a progression to the CEH (Practical), launched in March 2018, a test of penetration testing skills in a lab environment where the candidate must demonstrate the ability to apply techniques and use penetration testing tools to compromise various simulated systems within a virtual environment.

<span class="mw-page-title-main">Dave Kleiman</span> American computer investigator

Dave Kleiman was an American computer forensics expert, an author or co-author of multiple books and a frequent speaker at security related events.

<span class="mw-page-title-main">Angela Orebaugh</span> American computer scientist and author

Angela Orebaugh is a cyber technology and security author and researcher. In 2011, she was selected as Booz Allen Hamilton's first Cybersecurity Fellow. She is an assistant professor at the University of Virginia Department of Computer Science.

<span class="mw-page-title-main">Peter H. Gregory</span> American information security advisor

Peter Hart Gregory, CISA, CISSP is an American information security advisor, computer security specialist, and writer. He is the author of several books on computer security and information technology.

<span class="mw-page-title-main">Robert Slade</span> Canadian information scientist

Robert Michael Slade, also known as Robert M. Slade and Rob Slade, is a Canadian information security consultant, researcher and instructor. He is the author of Robert Slade's Guide to Computer Viruses, Software Forensics, Dictionary of Information Security and co-author of Viruses Revealed. Slade is the author of thousands of technical book reviews, today published on the techbooks mailing list and in the RISKS Digest, and archived in his Internet Review Project. An expert on computer viruses and malware, he is also the Mr. Slade of "Mr. Slade's lists".

Justin Tanner Petersen was an American hacker, concert promoter, sound engineer, private investigator and an informant for the Federal Bureau of Investigation. While tasked with helping to catch other hackers and fugitives wanted by the FBI, he continued to commit serious crimes.

<span class="mw-page-title-main">Happy99</span> Windows computer worm and early e-mail virus

Happy99 is a computer worm for Microsoft Windows. It first appeared in mid-January 1999, spreading through email and usenet. The worm installs itself and runs in the background of a victim's machine, without their knowledge. It is generally considered the first virus to propagate by email, and has served as a template for the creation of other self-propagating viruses. Happy99 has spread on multiple continents, including North America, Europe, and Asia.

David Harley is a former IT security researcher, author/editor and consultant living in the United Kingdom, known for his books on and research into malware, Mac security, anti-malware product testing and management of email abuse.

<span class="mw-page-title-main">Eric Vanderburg</span> American cyber security professional

Eric Vanderburg is an American cyber security, storage networking and information technology professional and writer living in Cleveland, Ohio.

William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.

This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.

<span class="mw-page-title-main">Chris Kubecka</span> American computer programmer and computer security researcher

Chris Kubecka is an American computer security researcher and cyberwarfare specialist. In 2012, Kubecka was responsible for getting the Saudi Aramco network running again after it was hit by one of the world's most devastating Shamoon cyberattacks. Kubecka also helped halt a second wave of July 2009 cyberattacks against South Korea. Kubecka has worked for the US Air Force as a Loadmaster, the United States Space Command and is now CEO of HypaSec, a security firm she founded in 2015. She lives and works in the Netherlands.

Marc Rogers is a British information security expert and ethical hacker. He received media attention for uncovering vulnerabilities in modern technologies such as Google Glass and Tesla’s Model S. He was also involved in the protection of medical facilities against hackers seeking to exploit health organizations during the COVID-19 pandemic.

Kim Crawley is a Canadian author of books and articles on IT security specifically and on hacker and computer literacy in general. Of Maltese descent, her first hand-on-experience with computers was with her novelist father's Windows 3.1 OEM PC. Her IT career proper began with being employed as customer support, which first piqued her interest in malware. A wide-ranging consultant, free-lancer and self-described generalist, she has written and consulted for tech companies such as AT&T, BlackBerry, NGINX, Synack, and Hack The Box, and passed the Certified Information Systems Security Professional (CISSP)exam on her first attempt whilst writing a book. She has published with O'Reilly Media, Packt Publishing, John Wiley & Sons, Inc., etc., and lives in Toronto, Canada, where she assiduously maintains a punk/goth aesthetic and DIY ethos. She is an autistic with ADHD.

References

  1. Technology (2011), United States Congress House Committee on Science, Space, and (2014). HealthCare.gov: Consequences of Stolen Identity : Hearing Before the Committee on Science, Space, and Technology, House of Representatives, One Hundred Thirteenth Congress, Second Session, January 16, 2014. U.S. Government Printing Office.{{cite book}}: CS1 maint: multiple names: authors list (link) CS1 maint: numeric names: authors list (link)
  2. "A Review of Inside Network Security Assessment". Archived from the original on 2011-07-13.
  3. "Archived copy". Archived from the original on 2014-01-20. Retrieved 2014-01-20.{{cite web}}: CS1 maint: archived copy as title (link)
  4. "CIPS Connections".
  5. "Michael Gregg discusses browser hijacking".
  6. "Cyber expert discusses online safety". YouTube . 9 December 2009. Archived from the original on 2021-12-20.
  7. "Villanova University Government IS Security Program".
  8. "Michael Gregg - Superior Solutions, Inc., CEO". www.techtarget.com. Retrieved 2020-01-07.