William Cheswick

Last updated
William Cheswick
Born
William R. "Bill" Cheswick
Other namesChes
EducationGraduated from Lawrenceville School
B.S. in Fundamental Science from Lehigh University

William R. "Bill" Cheswick (also known as "Ches") is a computer security and networking researcher.

Contents

Education

Cheswick graduated from Lawrenceville School in 1970 and received a B.S. in Fundamental Science in 1975 from Lehigh University. While at Lehigh, working with Doug Price and Steve Lidie, Cheswick co-authored the Senator line-oriented text editor.

Career

Cheswick's early career included contracting in Bethlehem, PA between 1975 and 1977. He was a Programmer for American Newspaper Publishers Association / Research Institute in Easton, PA between 1976 and 1977 and a Systems Programmer for Computer Sciences Corporation in Warminster, PA between 1977 and 1978. Following this, Cheswick joined Systems and Computer Technology Corporation where he served as a Systems Programmer and Consultant between 1978 and 1987. Much of Cheswick's early career was related to his expertise with Control Data Corporation (CDC) mainframes, their operating systems such as SCOPE and NOS, and the related COMPASS assembly language. Cheswick initially worked with CDC systems as a student at Lehigh University. [1]

Cheswick joined Bell Labs in 1987. Shortly thereafter, he and Steven M. Bellovin created one of the world's first network firewalls. [2] The resulting research and papers lead to their publication of the seminal book Firewalls and Internet Security , one of the first to describe the architecture of a firewall in detail. Cheswick and Bellovin also created one of the world's first honeypots in the course of detecting and trapping an attempted intruder into their network.

In 1998, Cheswick, still at Bell Labs (by then controlled by Lucent) started the Internet Mapping Project, assisted by Hal Burch. The research allowed large scale mapping of the internet for the first time, using tracerouting techniques to learn the connectivity graph of global networks. The work ultimately led to the founding in 2000 of a spinoff company, Lumeta, where Cheswick was a co-founder and held the title of Chief Scientist.

He joined AT&T Shannon Lab in 2007, where he remained until 2012.

Hobbies, interests, and personal projects

Cheswick currently lives in New Jersey with his wife. He has two children. His home is a farmhouse in Flemington, New Jersey, which is an electronic smart house, equipped with a voice synthesizer that reports relevant information, from mailbox status to evening stock news. Cheswick has developed a few interactive exhibits for science museums, including the Liberty Science Center in New Jersey. Cheswick also enjoys model rocketry, and lock picking (both electronic and physical). He is interested in developing better passwords as discussed in his article "Rethinking Passwords" (Communications of the ACM 56.2 (2013)). [3] Cheswick has also been seeking permission from filmmakers to publish his visualizations of their movies. [4]

Related Research Articles

<span class="mw-page-title-main">Bell Labs</span> Research and scientific development company

Bell Labs is an American industrial research and scientific development company. Researchers from there are credited with the development of radio astronomy, the transistor, the laser, the photovoltaic cell, the charge-coupled device (CCD), information theory, the Unix operating system, and the programming languages B, C, C++, S, SNOBOL, AWK, AMPL, and others. Ten Nobel Prizes and five Turing Awards have been awarded for work completed at Bell Laboratories.

Robert H. Morris Sr. was an American cryptographer and computer scientist.

<span class="mw-page-title-main">Virtual Network Computing</span> Graphical desktop-sharing system

Virtual Network Computing (VNC) is a graphical desktop-sharing system that uses the Remote Frame Buffer protocol (RFB) to remotely control another computer. It transmits the keyboard and mouse input from one computer to another, relaying the graphical-screen updates, over a network.

<span class="mw-page-title-main">Mary Ann Horton</span> American computer scientist and Usenet pioneer (born 1955)

Mary Ann Horton, is a Usenet and Internet pioneer. Horton contributed to Berkeley UNIX (BSD), including the vi editor and terminfo database, created the first email binary attachment tool uuencode, and led the growth of Usenet in the 1980s.

<span class="mw-page-title-main">Inferno (operating system)</span> Distributed operating system

Inferno is a distributed operating system started at Bell Labs and now developed and maintained by Vita Nuova Holdings as free software under the MIT License. Inferno was based on the experience gained with Plan 9 from Bell Labs, and the further research of Bell Labs into operating systems, languages, on-the-fly compilers, graphics, security, networking and portability. The name of the operating system, many of its associated programs, and that of the current company, were inspired by Dante Alighieri's Divine Comedy. In Italian, Inferno means "hell", of which there are nine circles in Dante's Divine Comedy.

Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.

<span class="mw-page-title-main">Matt Blaze</span> American researcher

Matt Blaze is an American researcher who focuses on the areas of secure systems, cryptography, and trust management. He is currently the McDevitt Chair of Computer Science and Law at Georgetown University, and is on the board of directors of the Tor Project.

An information security audit is an audit of the level of information security in an organization. It is an independent review and examination of system records, activities, and related documents. These audits are intended to improve the level of information security, avoid improper information security designs, and optimize the efficiency of the security safeguards and security processes. Within the broad scope of auditing information security there are multiple types of audits, multiple objectives for different audits, etc. Most commonly the controls being audited can be categorized as technical, physical and administrative. Auditing information security covers topics from auditing the physical security of data centers to auditing the logical security of databases, and highlights key components to look for and different methods for auditing these areas.

In cryptography, the interlock protocol, as described by Ron Rivest and Adi Shamir, is a protocol designed to frustrate eavesdropper attack against two parties that use an anonymous key exchange protocol to secure their conversation. A further paper proposed using it as an authentication protocol, which was subsequently broken.

<span class="mw-page-title-main">Steven M. Bellovin</span>

Steven M. Bellovin is a researcher on computer networking and security who has been a professor in the computer science department at Columbia University since 2005. Previously, Bellovin was a fellow at AT&T Labs Research in Florham Park, New Jersey.

A network telescope is an Internet system that allows one to observe different large-scale events taking place on the Internet. The basic idea is to observe traffic targeting the dark (unused) address-space of the network. Since all traffic to these addresses is suspicious, one can gain information about possible network attacks as well as other misconfigurations by observing it.

Crack is a Unix password cracking program designed to allow system administrators to locate users who may have weak passwords vulnerable to a dictionary attack. Crack was the first standalone password cracker for Unix systems and the first to introduce programmable dictionary generation as well.

<span class="mw-page-title-main">Internet Mapping Project</span> Collecting network paths

The Internet Mapping Project was started by William Cheswick and Hal Burch at Bell Labs in 1997. It has collected and preserved traceroute-style paths to some hundreds of thousands of networks almost daily since 1998. The project included visualization of the Internet data, and the Internet maps were widely disseminated.

Firewalls and Internet Security: Repelling the Wily Hacker is a 1994 book by William R. Cheswick and Steven M. Bellovin that helped define the concept of a network firewall. Describing in detail one of the first major firewall deployments at AT&T, the book influenced the formation of the perimeter security model, which became the dominant network security architecture in the mid-1990s.

<span class="mw-page-title-main">Marcus J. Ranum</span> Computer and network security researcher

Marcus J. Ranum is a computer and network security researcher. He is credited with a number of innovations in firewalls, including building the first Internet email server for the whitehouse.gov domain, and intrusion detection systems. He has held technical and leadership positions with a number of computer security companies, and is a faculty member of the Institute for Applied Network Security.

A distributed firewall is a security application on a host machine of a network that protects the servers and user machines of its enterprise's networks against unwanted intrusion. A firewall is a system or group of systems that implements a set of security rules to enforce access control between two networks to protect the "inside" network from the "outside" network. They filter all traffic regardless of its origin—the Internet or the internal network. Usually deployed behind the traditional firewall, they provide a second layer of defense. The advantages of the distributed firewall allow security rules (policies) to be defined and pushed out on an enterprise-wide basis, which is necessary for larger enterprises.

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.

Markus Jakobsson is a computer security researcher, entrepreneur and writer, whose work is focused on the issue of digital security.

<span class="mw-page-title-main">Mohamed M. Atalla</span> Egyptian engineer, physicist, cryptographer, inventor and entrepreneur

Mohamed M. Atalla was an Egyptian-American engineer, physicist, cryptographer, inventor and entrepreneur. He was a semiconductor pioneer who made important contributions to modern electronics. He is best known for inventing, along with his colleague Dawon Kahng, the MOSFET in 1959, which along with Atalla's earlier surface passivation processes, had a significant impact on the development of the electronics industry. He is also known as the founder of the data security company Atalla Corporation, founded in 1972. He received the Stuart Ballantine Medal and was inducted into the National Inventors Hall of Fame for his important contributions to semiconductor technology as well as data security.

The following outline is provided as an overview of and topical guide to computer security:

References

  1. "Steven Bellovin is this year's recipient of the ESORICS Outstanding Research Award". www.cs.columbia.edu.
  2. "Who Invented the Firewall?". Dark Reading. 15 January 2008.
  3. "Goodbye Gibberish: Making Passwords Easier to Remember". www.nbcnews.com.
  4. "Bill Cheswick's Thumbnail Experiments".