This article contains wording that promotes the subject in a subjective manner without imparting real information.(December 2016) |
This article may require cleanup to meet Wikipedia's quality standards. The specific problem is: Tone, lack of references, inline external links.(December 2016) |
Michael Gregg is an American computer security specialist, businessman, [1] author and co-author , some of his books include; Build Your Own Network Security Lab and Inside Network Security Assessment. [2] He has also served as an expert witness before a congressional committee on cyber security and identity theft. [3]
Gregg holds two associate degrees, a bachelor's degree and a master's degree. [4]
He has been quoted in newsprint and featured on various television and radio shows, including NPR, The New York Times, ABC, CBS, [5] Fox TV [6] and others discussing cybersecurity and ethical hacking.
He is the lead faculty member for Villanova University's online Cyber Security program. [7]
He also holds several certifications, including MCSE, MCT, CTT, A+, N+, CNA, CCNA, CIW Security Analyst, and TICSA. [8]
Gregg has contributed to the following published works:
Gregg has written articles for print and Internet publications such as:
The SANS Institute is a private U.S. for-profit company founded in 1989 that specializes in information security, cybersecurity training, and selling certificates. Topics available for training include cyber and network defenses, penetration testing, incident response, digital forensics, and auditing. The information security courses are developed through a consensus process involving administrators, security managers, and information security professionals. The courses cover security fundamentals and technical aspects of information security. The institute has been recognized for its training programs and certification programs. Per 2021, SANS is the world’s largest cybersecurity research and training organization. SANS is an acronym for SysAdmin, Audit, Network, and Security.
CISSP is an independent information security certification granted by the International Information System Security Certification Consortium, also known as ISC2.
Internet Relay Chat Flooding/Scrolling on an IRC network is a method of disconnecting users from an IRC server, exhausting bandwidth which causes network latency ('lag'), or just disrupting users. Floods can either be done by scripts or by external programs.
Rizon is an Internet Relay Chat (IRC) network. The IRC network itself ranks number 5 among the largest IRC networks. Rizon is popular with many anime fansubbing groups who work online, many of whom provide their content through XDCC via IRC bots in their distribution channels. It is also used by many users of eRepublik as a means of communication. File sharing of other copyrighted material such as Warez is also common in some channels on the network.
A security hacker or security researcher is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.
Certified Ethical Hacker (CEH) is a qualification given by EC-Council and obtained by demonstrating knowledge of assessing the security of computer systems by looking for vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. This knowledge is assessed by answering multiple choice questions regarding various ethical hacking techniques and tools. The code for the CEH exam is 312–50. This certification has now been made a baseline with a progression to the CEH (Practical), launched in March 2018, a test of penetration testing skills in a lab environment where the candidate must demonstrate the ability to apply techniques and use penetration testing tools to compromise various simulated systems within a virtual environment.
Dave Kleiman was an American computer forensics expert, an author or co-author of multiple books and a frequent speaker at security related events.
Angela Orebaugh is a cyber technology and security author and researcher. In 2011, she was selected as Booz Allen Hamilton's first Cybersecurity Fellow. She is an assistant professor at the University of Virginia Department of Computer Science.
Peter Hart Gregory, CISA, CISSP is an American information security advisor, computer security specialist, and writer. He is the author of several books on computer security and information technology.
Robert Michael Slade, also known as Robert M. Slade and Rob Slade, is a Canadian information security consultant, researcher and instructor. He is the author of Robert Slade's Guide to Computer Viruses, Software Forensics, Dictionary of Information Security and co-author of Viruses Revealed. Slade is the author of thousands of technical book reviews, today published on the techbooks mailing list and in the RISKS Digest, and archived in his Internet Review Project. An expert on computer viruses and malware, he is also the Mr. Slade of "Mr. Slade's lists".
Justin Tanner Petersen was an American hacker, concert promoter, sound engineer, private investigator and an informant for the Federal Bureau of Investigation. While tasked with helping to catch other hackers and fugitives wanted by the FBI, he continued to commit serious crimes.
Happy99 is a computer worm for Microsoft Windows. It first appeared in mid-January 1999, spreading through email and usenet. The worm installs itself and runs in the background of a victim's machine, without their knowledge. It is generally considered the first virus to propagate by email, and has served as a template for the creation of other self-propagating viruses. Happy99 has spread on multiple continents, including North America, Europe, and Asia.
David Harley is a former IT security researcher, author/editor and consultant living in the United Kingdom, known for his books on and research into malware, Mac security, anti-malware product testing and management of email abuse.
Eric Vanderburg is an American cyber security, storage networking and information technology professional and writer living in Cleveland, Ohio.
William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.
This is a list of cybersecurity information technology. Cybersecurity is security as it is applied to information technology. This includes all technology that stores, manipulates, or moves data, such as computers, data networks, and all devices connected to or included in networks, such as routers and switches. All information technology devices and facilities need to be secured against intrusion, unauthorized use, and vandalism. Additionally, the users of information technology should be protected from theft of assets, extortion, identity theft, loss of privacy and confidentiality of personal information, malicious mischief, damage to equipment, business process compromise, and the general activity of cybercriminals. The public should be protected against acts of cyberterrorism, such as the compromise or loss of the electric power grid.
Chris Kubecka is an American computer security researcher and cyberwarfare specialist. In 2012, Kubecka was responsible for getting the Saudi Aramco network running again after it was hit by one of the world's most devastating Shamoon cyberattacks. Kubecka also helped halt a second wave of July 2009 cyberattacks against South Korea. Kubecka has worked for the US Air Force as a Loadmaster, the United States Space Command and is now CEO of HypaSec, a security firm she founded in 2015. She lives and works in the Netherlands.
Marc Rogers is a British information security expert and ethical hacker. He received media attention for uncovering vulnerabilities in modern technologies such as Google Glass and Tesla’s Model S. He was also involved in the protection of medical facilities against hackers seeking to exploit health organizations during the COVID-19 pandemic.
Kim Crawley is a Canadian author of books and articles on IT security specifically and on hacker and computer literacy in general. Of Maltese descent, her first hand-on-experience with computers was with her novelist father's Windows 3.1 OEM PC. Her IT career proper began with being employed as customer support, which first piqued her interest in malware. A wide-ranging consultant, free-lancer and self-described generalist, she has written and consulted for tech companies such as AT&T, BlackBerry, NGINX, Synack, and Hack The Box, and passed the Certified Information Systems Security Professional (CISSP)exam on her first attempt whilst writing a book. She has published with O'Reilly Media, Packt Publishing, John Wiley & Sons, Inc., etc., and lives in Toronto, Canada, where she assiduously maintains a punk/goth aesthetic and DIY ethos. She is an autistic with ADHD.
{{cite book}}
: CS1 maint: multiple names: authors list (link) CS1 maint: numeric names: authors list (link){{cite web}}
: CS1 maint: archived copy as title (link)