Robert Slade

Last updated
Robert Slade
Robert Slade-20060614.jpg
Nationality Canadian
Alma mater University of British Columbia
University of Oregon
Regent College
Scientific career
Fields Information security
Malware
Professional certification

Robert Michael Slade, also known as Robert M. Slade and Rob Slade, is a Canadian information security consultant, researcher and instructor. He is the author of Robert Slade's Guide to Computer Viruses, Software Forensics, Dictionary of Information Security and co-author of Viruses Revealed. Slade is the author of thousands of technical book reviews, today published on the techbooks mailing list and in the RISKS Digest, and archived in his Internet Review Project. An expert on computer viruses and malware, he is also the Mr. Slade of "Mr. Slade's lists".

Contents

Family and education

Slade married Gloria J. Slade who edits much of his work [1] and is the editor of Slade's book reviews. He holds a bachelor's degree from the University of British Columbia, a master's in computer and information science education from the University of Oregon and a diploma in Christian studies from Regent College. [1]

Malware and forensics

Slade became one of a small number of researchers who can be called the world's experts on malware. Fred Cohen named Slade's early work organizing computer viruses, software, BBSes and book reviews Mr. Slade's lists. [2] [3] Slade is one of fewer than thirty people worldwide who are credited for contributions in the final version of the VIRUS-L FAQ, which, with the Usenet group comp.virus and the VIRUS-L mailing list, was the public group of record for computer virus issues from 1988 to 1995. [4] Until 1996 he maintained the Antiviral Software Evaluation FAQ, a quick reference for users seeking antivirus software and a vendor contacts list. [5] He was a contributor as well to at least three [6] other group computer virus FAQs before the Web came to prominence. He has written two books about viruses: he was sole author of Robert Slade's Guide to Computer Viruses, first published in 1994 (2nd edition 1996) and co-wrote Viruses Revealed with David Harley and Urs Gattiker in 2001.

Slade advanced the field of computer forensics when through his antivirus research he found that the intentions and identity of virus authors can be discovered in their program code. [7] He created the first course ever offered in forensic programming. [8] [9] His book Software Forensics was published in 2004 [10] and his chapter on the subject is in print in the Information Security Management Handbook as of the fifth edition. [11]

Information security

Today Slade is a consultant to businesses and government—among his client list are Fortune 500 companies and the government of Canada [12] —as well as to educational institutions. [12] Slade creates seminars for local, federal and international training groups. He is a senior instructor for (ISC)² where he develops courses in information security and quality assurance (QA) for those who seek certification. [12] [13] Slade himself is one of the world's approximately 60,000 [14] CISSPs, [11] a certification used in private industry as well as, at least in the United States, in government and defense. [15] [16] [17]

Slade moved his online security glossary in 2006 to the book Dictionary of Information Security. [18] Virus Bulletin remarked about the unusual collection of five forewords, [19] "that so many acknowledged experts are willing to contribute says something about the author's standing in the field"—the forewords were written by Fred Cohen, Jack Holleran, Peter G. Neumann, Harold Tipton and Gene Spafford. [19] The dictionary is considered to be "dependable baseline definitions" [19] and a "citable, common source". [20]

Internet Review Project

Slade has "surveyed most of the literature" in his field and shared his knowledge in the Internet Review Project, a collection of his published book reviews. [20] While his first priority to information security, he reviews works in other fields as well. His reviews are often critical; to the project FAQ question "Don't you like any books?", Slade replies "I'm a cruel reviewer. But fair!" [21]

Bibliography

Notes

  1. 1 2 Slade, Robert (2006). Dictionary of Information Security . Syngress. pp. Front. ISBN   1-59749-115-2.
  2. "Dr. Fred Cohen". Robert Slade. Retrieved 2008-05-22.
  3. "Editorial reviews of Software Forensics". Various via Amazon.com. July 2004. Retrieved 2008-05-21.
  4. FitzGerald, Nick (October 9, 1995). "VIRUS-L/comp.virus Frequently Asked Questions (FAQ) v2.00". Advameg. Retrieved 2008-05-22.
  5. "Antiviral Software Evaluation FAQ". Robert Slade. November 13, 1996. Retrieved 2008-05-22.
  6. Wenzel, George (August 19, 1999). "alt.comp.virus (Frequently Asked Questions) Version 1.1". Advameg. Retrieved 2008-05-22. and Wenzel, George (August 23, 1999). "Mini-FAQ: alt.comp.virus (version 1.2)". Advameg. Retrieved 2008-05-22. and Harley, David (January 7, 2000). "Viruses and the Mac FAQ Version 1.6b". Advameg. Retrieved 2008-05-22.
  7. Slade, Robert M. (2004). Software Forensics : Collecting Evidence from the Scene of a Digital Crime. McGraw-Hill Professional. p. 5. ISBN   0-07-142804-6.
  8. "Speaker Bios". (ISC)². Retrieved 2008-05-20.
  9. "Software Forensics/Forensic Programming course table of contents". Robert Slade. Retrieved 2008-05-20.
  10. "Software Forensics". McGraw-Hill (mcgraw-hill.com.au). Archived from the original on 2008-08-03. Retrieved 2008-05-20.
  11. 1 2 Tipton, Harold F.; Krause, Micki, eds. (2003). Information Security Management Handbook. Auerbach. p. Table of Contents. ISBN   0-8493-1997-8.
  12. 1 2 3 "Author Biography". McGraw-Hill (mcgraw-hill.com.au). Archived from the original on 2008-08-03. Retrieved 2008-05-20.
  13. Hansche, Susan; Berti, John; Hare, Hare (2003). Official (ISC)2 guide to the CISSP exam. CRC Press. p. xiii. ISBN   0-8493-1707-X.
  14. Member count was 59,797 as of May 20, 2008 in "Member Counts". (ISC)². Retrieved 2008-05-20.
  15. "CISSP (Certified Information Systems Security Professional) (Management Level 2 & 3 Training %2F Technical Level 3 Training)". U.S. Army Information Assurance Training Center. Retrieved 2008-05-22.
  16. "NSA Certifies Information Security Staff; CISSP Designation Awarded to 51 Employees" (Press release). (ISC)2, NSA via CNET Networks (BNET). November 18, 2002. Retrieved 2008-05-22.
  17. "(ISC)² Launches New Certification for U.S. National Security Information Security Professionals" (Press release). (ISC)². July 23, 2003. Retrieved 2008-05-22.
  18. "Rob Slade's Dictionary Errata Page". Robert Slade. Retrieved 2008-05-20.
  19. 1 2 3 Harley, David (September 2006). "War of the Words". Virus Bulletin: 13–14. ISSN   1749-7027 . Retrieved 2008-05-20.
  20. 1 2 Eugene Spafford in Slade, Robert (2006). Dictionary of Information Security . Syngress. pp. Front. ISBN   1-59749-115-2.
  21. "Rob Slade's Book Reviews FAQ" . Retrieved 2008-05-20.

Related Research Articles

CISSP is an independent information security certification granted by the International Information System Security Certification Consortium, also known as ISC2.

Internet Relay Chat Flooding/Scrolling on an IRC network is a method of disconnecting users from an IRC server, exhausting bandwidth which causes network latency ('lag'), or just disrupting users. Floods can either be done by scripts or by external programs.

<span class="mw-page-title-main">Encapsulation (networking)</span> Communication protocol design method

Encapsulation is the computer-networking process of concatenating layer-specific headers or trailers with a service data unit for transmitting information over computer networks. Deencapsulation is the reverse computer-networking process for receiving information; it removes from the protocol data unit (PDU) a previously concatenated header or tailer that an underlying communications layer transmitted.

<span class="mw-page-title-main">TestDisk</span> Data recovery utility

TestDisk is a free and open-source data recovery utility that helps users recover lost partitions or repair corrupted filesystems. TestDisk can collect detailed information about a corrupted drive, which can then be sent to a technician for further analysis. TestDisk supports DOS, Microsoft Windows, Linux, FreeBSD, NetBSD, OpenBSD, SunOS, and MacOS. TestDisk handles non-partitioned and partitioned media. In particular, it recognizes the GUID Partition Table (GPT), Apple partition map, PC/Intel BIOS partition tables, Sun Solaris slice and Xbox fixed partitioning scheme. TestDisk uses a command line user interface. TestDisk can recover deleted files with 97% accuracy.

<span class="mw-page-title-main">Dave Kleiman</span> American computer investigator

Dave Kleiman was an American computer forensics expert, an author or co-author of multiple books and a frequent speaker at security related events.

ircII Oldest still active developed IRC-Client

ircII is a free, open-source Unix IRC and ICB client written in C. Initially released in the late 1980s, it is the oldest IRC client still maintained.

The furlong–firkin–fortnight (FFF) system is a humorous system of units based on unusual or impractical measurements. The length unit of the system is the furlong, the mass unit is the mass of a firkin of water, and the time unit is the fortnight. Like the SI or metre–kilogram–second systems, there are derived units for velocity, volume, mass and weight, etc. It is sometimes referred to as the FFFF system where the fourth 'F' is degrees Fahrenheit for temperature.

<span class="mw-page-title-main">Angela Orebaugh</span> American computer scientist and author

Angela Orebaugh is a cyber technology and security author and researcher. In 2011, she was selected as Booz Allen Hamilton's first Cybersecurity Fellow. She is an assistant professor at the University of Virginia Department of Computer Science.

<span class="mw-page-title-main">Storm botnet</span> Computer botnet

The Storm botnet or Storm worm botnet was a remotely controlled network of "zombie" computers that had been linked by the Storm Worm, a Trojan horse spread through e-mail spam. At its height in September 2007, the Storm botnet was running on anywhere from 1 million to 50 million computer systems, and accounted for 8% of all malware on Microsoft Windows computers. It was first identified around January 2007, having been distributed by email with subjects such as "230 dead as storm batters Europe," giving it its well-known name. The botnet began to decline in late 2007, and by mid-2008 had been reduced to infecting about 85,000 computers, far less than it had infected a year earlier.

<span class="mw-page-title-main">Howard Schmidt</span> American computer security expert (1949 - 2017)

Howard Anthony Schmidt was a partner with Tom Ridge in Ridge Schmidt Cyber LLC, a consultancy company in the field of cybersecurity. He was the Cyber-Security Coordinator of the Obama Administration, operating in the Executive Office of the President of the United States. He announced his retirement from that position on May 17, 2012, effective at the end of the month.

<span class="mw-page-title-main">Peter H. Gregory</span> American information security advisor

Peter Hart Gregory, CISA, CISSP is an American information security advisor, computer security specialist, and writer. He is the author of several books on computer security and information technology.

Man-in-the-browser, a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify transaction content or insert additional transactions, all in a covert fashion invisible to both the user and host web application. A MitB attack will be successful irrespective of whether security mechanisms such as SSL/PKI and/or two- or three-factor authentication solutions are in place. A MitB attack may be countered by using out-of-band transaction verification, although SMS verification can be defeated by man-in-the-mobile (MitMo) malware infection on the mobile phone. Trojans may be detected and removed by antivirus software;, but a 2011 report concluded that additional measures on top of antivirus software were needed.

Michael Gregg is an American computer security specialist, businessman, author and co-author of several books, including Build Your Own Network Security Lab and Inside Network Security Assessment. He has also served as an expert witness before a congressional committee on cyber security and identity theft.

David Harley is an IT security researcher, author/editor and consultant living in the United Kingdom, known for his books on and research into malware, Mac security, anti-malware product testing and management of email abuse.

ISC2 Non-profit IT cybersecurity organization

The International Information System Security Certification Consortium, or ISC2, is a non-profit organization which specializes in training and certifications for cybersecurity professionals. It has been described as the "world's largest IT security organization". The most widely known certification offered by ISC2 is the Certified Information Systems Security Professional (CISSP) certification.

High Technology Crime Investigation Association (HTCIA) is an international non-profit professional organization devoted to the prevention, investigation, and prosecution of crimes involving advanced technologies. Author and cybercrime expert, Christopher Brown, described HTCIA as "one of the largest and most respected" associations of its kind.

<span class="mw-page-title-main">Eric Vanderburg</span> American cyber security professional

Eric Vanderburg is an American cyber security, storage networking and information technology professional and writer living in Cleveland, Ohio.

<span class="mw-page-title-main">Stephen T. Cobb</span>

Stephen Cobb is an expert on security, privacy, and the risks related to digital technology.

William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.