National Cyber Security Hall Of Fame
   HOME
*





National Cyber Security Hall Of Fame
The National Cyber Security Hall of Fame, founded by Larry Letow and Rick Geritz, was established in 2012 to recognize the contributions of key individuals in the field of cyber security; its mission statement is, ''Respect the Past - Protect the Future.'' According to its website, it is designed to honor the innovative individuals and organizations which had the vision and leadership to create the fundamental building blocks for the cybersecurity Industry. The organization also highlights major milestones in the industry's 40-year history through timelinerepresentation, which includes inductees and their corresponding accomplishments. Nominations Nominations into the Cyber Security Hall of Fame are submitted in the following categories, then reviewed by the Advisory Committee, chaired in 2013 by Mike Jacobs. *Technology *Policy *Public Awareness *Education *Business Founders Larry Letow, Operations Partner for Interprise Partners, and Rick Gertiz, CEO of SwingAI Advisory board A ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide. The field has become of significance due to the expanded reliance on computer systems, the Internet, and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, including smartphones, televisions, and the various devices that constitute the Internet of things (IoT). Cybersecurity is one of the most significant challenges of the contemporary world, due to both the complexity of information systems and the societies they support. Security is of especially high importance for systems that govern large-scale systems with far-reaching physical effects, such as power distribution, ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Steven M
Stephen or Steven is a common English first name. It is particularly significant to Christians, as it belonged to Saint Stephen ( grc-gre, Στέφανος ), an early disciple and deacon who, according to the Book of Acts, was stoned to death; he is widely regarded as the first martyr (or "protomartyr") of the Christian Church. In English, Stephen is most commonly pronounced as ' (). The name, in both the forms Stephen and Steven, is often shortened to Steve or Stevie. The spelling as Stephen can also be pronounced which is from the Greek original version, Stephanos. In English, the female version of the name is Stephanie. Many surnames are derived from the first name, including Stephens, Stevens, Stephenson, and Stevenson, all of which mean "Stephen's (son)". In modern times the name has sometimes been given with intentionally non-standard spelling, such as Stevan or Stevon. A common variant of the name used in English is Stephan ; related names that have found some curr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


In-Q-Tel
In-Q-Tel (IQT), formerly Peleus and In-Q-It, is an American not-for-profit venture capital firm based in Arlington, Virginia. It invests in high-tech companies to keep the Central Intelligence Agency, and other intelligence agencies, equipped with the latest in information technology in support of United States intelligence capability. The name "In-Q-Tel" is an intentional reference to Q, the fictional inventor who supplies technology to James Bond. In-Q-Tel has stated that the average dollar invested by In-Q-Tel in 2016 attracts fifteen dollars from other investors. History Originally named Peleus and known as In-Q-It, In-Q-Tel was founded by Norm Augustine, a former CEO of Lockheed Martin, and by Gilman Louie, who was In-Q-Tel's first CEO. In-Q-Tel's mission is to identify and invest in companies developing cutting-edge technologies that serve United States national security interests. According to the Washington post, In-Q-Tel started as the idea of then CIA director George ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Dan Geer
Dan Geer is a computer security analyst and risk management specialist. He is recognized for raising awareness of critical computer and network security issues before the risks were widely understood, and for ground-breaking work on the economics of security. Geer is currently the chief information security officer for In-Q-Tel, a not-for-profit venture capital firm that invests in technology to support the Central Intelligence Agency. In 2003, Geer's 24-page report entitle"Cyber''In''security: The Cost of Monopoly"was released by the Computer and Communications Industry Association (CCIA). The paper argued that Microsoft's dominance of desktop computer operating systems is a threat to national security. Geer was fired (from consultancy @Stake) the day the report was made public. Geer has cited subsequent changes in the Vista operating system (notably a location-randomization feature) as evidence that Microsoft "accepted the paper." Geer received a Bachelor of Science in Elec ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Data Encryption Standard
The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryptography. Developed in the early 1970s at IBM and based on an earlier design by Horst Feistel, the algorithm was submitted to the National Bureau of Standards (NBS) following the agency's invitation to propose a candidate for the protection of sensitive, unclassified electronic government data. In 1976, after consultation with the National Security Agency (NSA), the NBS selected a slightly modified version (strengthened against differential cryptanalysis, but weakened against brute-force attacks), which was published as an official Federal Information Processing Standard (FIPS) for the United States in 1977. The publication of an NSA-approved encryption standard led to its quick international adoption and widespread academic scrutiny. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Horst Feistel
Horst Feistel (January 30, 1915 – November 14, 1990) was a German-American cryptographer who worked on the design of ciphers at IBM, initiating research that culminated in the development of the Data Encryption Standard (DES) in the 1970s. The structure used in DES, called a Feistel network, is commonly used in many block ciphers. Life and work Feistel was born in Berlin, Germany in 1915, and moved to the United States in 1934. During World War II, he was placed under house arrest, but gained US citizenship on 31 January 1944. The following day he was granted a security clearance and began work for the US Air Force Cambridge Research Center (AFCRC) on Identification Friend or Foe (IFF) devices until the 1950s. He was subsequently employed at MIT's Lincoln Laboratory, then the MITRE corporation. Finally, he moved to IBM, where he received an award for his cryptographic work. His research at IBM led to the development of the Lucifer and Data Encryption Standard (DES) ciphers ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Jerry Saltzer
Jerome Howard "Jerry" Saltzer (born October 9, 1939) is an American computer scientist. Career Jerry Saltzer received an ScD in Electrical Engineering from MIT in 1966. His dissertation '''Traffic Control in a Multiplexed System was advised by Fernando Corbató. In 1966, he joined the faculty of the Department of Electrical Engineering and Computer Science at MIT. One of Saltzer's earliest involvements with computers was with MIT's Compatible Time-Sharing System in the early 1960s. In the later 1960s and early 1970s, he was one of the team leaders of the Multics operating system project. Multics, though not particularly commercially successful in itself, has had a major impact on all subsequent operating systems; in particular, it was an inspiration for Ken Thompson to develop Unix. Saltzer's contributions to Multics included the now-standard kernel stack switching method of process switching, as well as oft-cited work on the security architecture for shared information syst ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Fletcher School Of Law And Diplomacy
The Fletcher School of Law and Diplomacy is the graduate school of international affairs of Tufts University, in Medford, Massachusetts. The School is one of America's oldest graduate schools of international relations and is well-ranked in its masters and doctoral programs. As of 2017, the student body numbered around 230, of whom 36 percent were international students from 70 countries, and around a quarter were U.S. minorities. The school's alumni network numbers over 9,500 in 160 countries, and includes ambassadors, diplomats, foreign ministers, high-ranking military officers, heads of nonprofit organizations, and corporate executives. History The Fletcher School of Law and Diplomacy was founded in 1933 with the bequest of Austin Barclay Fletcher, who left over $3 million to Tufts University upon his death in 1923. A third of these funds were dedicated “for the establishment and maintenance of a School of Law and Diplomacy, to be known as The Fletcher School of Law or T ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Susan Landau
Susan Landau is an American mathematician, engineer, cybersecurity policy expert, and Bridge Professor in Cybersecurity and Policy at the Fletcher School of Law and Diplomacy at Tufts University. and She previously worked as a Senior Staff Privacy Analyst at Google. She was a Guggenheim Fellow and a visiting scholar at the Computer Science Department, Harvard University in 2012. Career Landau is an alumna of Bronx Science and the Hampshire College Summer Studies in Mathematics. She then graduated with an A.B. in mathematics from Princeton University in 1976 after completing a senior thesis titled "Simple algebras", under the supervision of John Coleman Moore. She went on to received a master's degree from Cornell University in 1979 before pursuing graduate studies at the Massachusetts Institute of Technology, where she received a Ph.D. in mathematics in 1983 after completing a doctoral dissertation, titled "On computing Galois groups and its application to solvability by ra ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Pretty Good Privacy
Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing, encrypting, and decrypting texts, e-mails, files, directories, and whole disk partitions and to increase the security of e-mail communications. Phil Zimmermann developed PGP in 1991. PGP and similar software follow the OpenPGP, an open standard of PGP encryption software, standard (RFC 4880) for encrypting and decrypting data. Design PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and finally public-key cryptography; each step uses one of several supported algorithms. Each public key is bound to a username or an e-mail address. The first version of this system was generally known as a web of trust to contrast with the X.509 system, which uses a hierarchical approach based on certificate authority and which was added to PGP implementations later. Current versions of P ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Philip Zimmermann
Philip R. Zimmermann (born 1954) is an American computer scientist and cryptographer. He is the creator of Pretty Good Privacy (PGP), the most widely used email encryption software in the world. He is also known for his work in VoIP encryption protocols, notably ZRTP and Zfone. Zimmermann is co-founder and Chief Scientist of the global encrypted communications firm Silent Circle. Background He was born in Camden, New Jersey. Zimmermann received a B.S. degree in computer science from Florida Atlantic University in Boca Raton, Florida in 1978. In the 1980s, Zimmermann worked in Boulder, Colorado as a software engineer on the Nuclear Weapons Freeze Campaign as a military policy analyst. PGP In 1991, he wrote the popular Pretty Good Privacy (PGP) program, and made it available (together with its source code) through public FTP for download, the first widely available program implementing public-key cryptography. Shortly thereafter, it became available overseas via the Internet, t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Transport Layer Security
Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in securing HTTPS remains the most publicly visible. The TLS protocol aims primarily to provide security, including privacy (confidentiality), integrity, and authenticity through the use of cryptography, such as the use of certificates, between two or more communicating computer applications. It runs in the presentation layer and is itself composed of two layers: the TLS record and the TLS handshake protocols. The closely related Datagram Transport Layer Security (DTLS) is a communications protocol providing security to datagram-based applications. In technical writing you often you will see references to (D)TLS when it applies to both versions. TLS is a proposed Internet Engineering Task Force (IETF) standard, first defined in 1999, and the c ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]