Robert Slade | |
---|---|
Nationality | Canadian |
Alma mater | University of British Columbia University of Oregon Regent College |
Scientific career | |
Fields | Information security Malware Professional certification |
Robert Michael Slade, also known as Robert M. Slade and Rob Slade, is a Canadian information security consultant, researcher and instructor. He is the author of Robert Slade's Guide to Computer Viruses, Software Forensics, Dictionary of Information Security and co-author of Viruses Revealed. Slade is the author of thousands of technical book reviews, today published on the techbooks mailing list and in the RISKS Digest, and archived in his Internet Review Project. An expert on computer viruses and malware, he is also the Mr. Slade of "Mr. Slade's lists".
Slade married Gloria J. Slade who edits much of his work [1] and is the editor of Slade's book reviews. He holds a bachelor's degree from the University of British Columbia, a master's in computer and information science education from the University of Oregon and a diploma in Christian studies from Regent College. [1]
Slade became one of a small number of researchers who can be called the world's experts on malware. Fred Cohen named Slade's early work organizing computer viruses, software, BBSes and book reviews Mr. Slade's lists. [2] [3] Slade is one of fewer than thirty people worldwide who are credited for contributions in the final version of the VIRUS-L FAQ, which, with the Usenet group comp.virus and the VIRUS-L mailing list, was the public group of record for computer virus issues from 1988 to 1995. [4] Until 1996 he maintained the Antiviral Software Evaluation FAQ, a quick reference for users seeking antivirus software and a vendor contacts list. [5] He was a contributor as well to at least three [6] other group computer virus FAQs before the Web came to prominence. He has written two books about viruses: he was sole author of Robert Slade's Guide to Computer Viruses, first published in 1994 (2nd edition 1996) and co-wrote Viruses Revealed with David Harley and Urs Gattiker in 2001.
Slade advanced the field of computer forensics when through his antivirus research he found that the intentions and identity of virus authors can be discovered in their program code. [7] He created the first course ever offered in forensic programming. [8] [9] His book Software Forensics was published in 2004 [10] and his chapter on the subject is in print in the Information Security Management Handbook as of the fifth edition. [11]
Today Slade is a consultant to businesses and government—among his client list are Fortune 500 companies and the government of Canada [12] —as well as to educational institutions. [12] Slade creates seminars for local, federal and international training groups. He is a senior instructor for (ISC)² where he develops courses in information security and quality assurance (QA) for those who seek certification. [12] [13] Slade himself is one of the world's approximately 60,000 [14] CISSPs, [11] a certification used in private industry as well as, at least in the United States, in government and defense. [15] [16] [17]
Slade moved his online security glossary in 2006 to the book Dictionary of Information Security. [18] Virus Bulletin remarked about the unusual collection of five forewords, [19] "that so many acknowledged experts are willing to contribute says something about the author's standing in the field"—the forewords were written by Fred Cohen, Jack Holleran, Peter G. Neumann, Harold Tipton and Gene Spafford. [19] The dictionary is considered to be "dependable baseline definitions" [19] and a "citable, common source". [20]
Slade has "surveyed most of the literature" in his field and shared his knowledge in the Internet Review Project, a collection of his published book reviews. [20] While his first priority to information security, he reviews works in other fields as well. His reviews are often critical; to the project FAQ question "Don't you like any books?", Slade replies "I'm a cruel reviewer. But fair!" [21]
CISSP is an independent information security certification granted by the International Information System Security Certification Consortium, also known as ISC2.
Internet Relay Chat Flooding/Scrolling on an IRC network is a method of disconnecting users from an IRC server, exhausting bandwidth which causes network latency ('lag'), or just disrupting users. Floods can either be done by scripts or by external programs.
Encapsulation is the computer-networking process of concatenating layer-specific headers or trailers with a service data unit for transmitting information over computer networks. Deencapsulation is the reverse computer-networking process for receiving information; it removes from the protocol data unit (PDU) a previously concatenated header or tailer that an underlying communications layer transmitted.
TestDisk is a free and open-source data recovery utility that helps users recover lost partitions or repair corrupted filesystems. TestDisk can collect detailed information about a corrupted drive, which can then be sent to a technician for further analysis. TestDisk supports DOS, Microsoft Windows, Linux, FreeBSD, NetBSD, OpenBSD, SunOS, and MacOS. TestDisk handles non-partitioned and partitioned media. In particular, it recognizes the GUID Partition Table (GPT), Apple partition map, PC/Intel BIOS partition tables, Sun Solaris slice and Xbox fixed partitioning scheme. TestDisk uses a command line user interface. TestDisk can recover deleted files with 97% accuracy.
Dave Kleiman was an American computer forensics expert, an author or co-author of multiple books and a frequent speaker at security related events.
ircII is a free, open-source Unix IRC and ICB client written in C. Initially released in the late 1980s, it is the oldest IRC client still maintained.
The furlong–firkin–fortnight (FFF) system is a humorous system of units based on unusual or impractical measurements. The length unit of the system is the furlong, the mass unit is the mass of a firkin of water, and the time unit is the fortnight. Like the SI or metre–kilogram–second systems, there are derived units for velocity, volume, mass and weight, etc. It is sometimes referred to as the FFFF system where the fourth 'F' is degrees Fahrenheit for temperature.
Angela Orebaugh is a cyber technology and security author and researcher. In 2011, she was selected as Booz Allen Hamilton's first Cybersecurity Fellow. She is an assistant professor at the University of Virginia Department of Computer Science.
The Storm botnet or Storm worm botnet was a remotely controlled network of "zombie" computers that had been linked by the Storm Worm, a Trojan horse spread through e-mail spam. At its height in September 2007, the Storm botnet was running on anywhere from 1 million to 50 million computer systems, and accounted for 8% of all malware on Microsoft Windows computers. It was first identified around January 2007, having been distributed by email with subjects such as "230 dead as storm batters Europe," giving it its well-known name. The botnet began to decline in late 2007, and by mid-2008 had been reduced to infecting about 85,000 computers, far less than it had infected a year earlier.
Howard Anthony Schmidt was a partner with Tom Ridge in Ridge Schmidt Cyber LLC, a consultancy company in the field of cybersecurity. He was the Cyber-Security Coordinator of the Obama Administration, operating in the Executive Office of the President of the United States. He announced his retirement from that position on May 17, 2012, effective at the end of the month.
Peter Hart Gregory, CISA, CISSP is an American information security advisor, computer security specialist, and writer. He is the author of several books on computer security and information technology.
Man-in-the-browser, a form of Internet threat related to man-in-the-middle (MITM), is a proxy Trojan horse that infects a web browser by taking advantage of vulnerabilities in browser security to modify web pages, modify transaction content or insert additional transactions, all in a covert fashion invisible to both the user and host web application. A MitB attack will be successful irrespective of whether security mechanisms such as SSL/PKI and/or two- or three-factor authentication solutions are in place. A MitB attack may be countered by using out-of-band transaction verification, although SMS verification can be defeated by man-in-the-mobile (MitMo) malware infection on the mobile phone. Trojans may be detected and removed by antivirus software;, but a 2011 report concluded that additional measures on top of antivirus software were needed.
Michael Gregg is an American computer security specialist, businessman, author and co-author of several books, including Build Your Own Network Security Lab and Inside Network Security Assessment. He has also served as an expert witness before a congressional committee on cyber security and identity theft.
David Harley is an IT security researcher, author/editor and consultant living in the United Kingdom, known for his books on and research into malware, Mac security, anti-malware product testing and management of email abuse.
The International Information System Security Certification Consortium, or ISC2, is a non-profit organization which specializes in training and certifications for cybersecurity professionals. It has been described as the "world's largest IT security organization". The most widely known certification offered by ISC2 is the Certified Information Systems Security Professional (CISSP) certification.
High Technology Crime Investigation Association (HTCIA) is an international non-profit professional organization devoted to the prevention, investigation, and prosecution of crimes involving advanced technologies. Author and cybercrime expert, Christopher Brown, described HTCIA as "one of the largest and most respected" associations of its kind.
Eric Vanderburg is an American cyber security, storage networking and information technology professional and writer living in Cleveland, Ohio.
Stephen Cobb is an expert on security, privacy, and the risks related to digital technology.
William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.