Angela Orebaugh

Angela Orebaugh

Angela Orebaugh (1973) is a security technologist, scientist, and author. She is the author of the Syngress' "Wireshark and Ethereal Network Protocol Analyzer Toolkit" and "Ethereal Packet Sniffing". She is also known for her work as a researcher, writer, and speaker for the SANS Institute and as faculty for The Institute for Applied Network Security. She is a frequent speaker at a variety of conferences and security events.

She currently serves as a technology advisor and consultant for commercial and government clients.Fact|date=November 2007 She is a contractor supporting the National Institute of Standards and Technology (NIST), where she is the lead contractor for several security initiatives including the authoring of security specialpublications, the National Vulnerability Database (NVD), Security Content Automation Protocol (SCAP) project, and electronic voting security standards development.

Ms. Orebaugh is a Research Fellow and Adjunct Professor for George Mason University where she performs research and development in information security. At GMU she developed and taught the Intrusion Detection curriculum for the Forensics program in the Department of Electrical and Computer Engineering. Her current research interests include peer-reviewed publications in the areas of intrusion detection and prevention, data mining, attacker profiling, user behavior analysis, and network forensics.

Ms. Orebaugh is known for her work in security architecture design and analysis, perimeter defenseFact|date=November 2007, vulnerability assessmentFact|date=November 2007 and penetration testingFact|date=November 2007, computer forensics, intrusion detection and prevention, and incident handling and responseFact|date=November 2007.

Personal life

Ms. Orebaugh has been active in the information security community since the early 1990s. She holds a Masters degree in Computer Science and a Bachelors degree in Computer Information Systems from James Madison University. She is currently writing her dissertation for her Ph.D. at George Mason University, with a concentration in Information Security. She lives outside of Washington DC.

Published works

Ms. Orebaugh has numerous books and articles published in information security:

Books
*Orebaugh, A. et.al. "Wireshark & Ethereal Network Protocol Analyzer Toolkit", Syngress Publishing, 2006.
*Orebaugh, A., Biles, S., Babbin, J., "Snort Cookbook", OReilly Publishing, ISBN 0596007914, 2005.
*Orebaugh, A., Rash, M., Babbin, J. and Pinkard, B., "Intrusion Prevention and Active Response: Deploying Network and Host IPS", Syngress Publishing, ISBN 193226647X, 2005.
*Orebaugh, A., "Ethereal Packet Sniffing", Syngress Publishing, Boston, MA., ISBN 1932266828, 2004.Journal Papers (refereed)
*Orebaugh, A., "Proactive Forensics", Journal of Digital Forensic Practice, Volume 1, Issue 1, March 2006.Conference Papers (refereed)
*Orebaugh, A. "An Instant Messaging Intrusion Detection System Framework: Using Character Frequency Analysis for Authorship Identification and Validation". IEEE International Carnahan Conference on Security Technology (ICCST). 2006.Invited Talks
*Orebaugh, A. "Deep Packet Inspection", SANS, 2004.
*Orebaugh, A. "The Importance of Information Security Certifications", FISSEA, 2004.
*Orebaugh, A. "Wireless: Ready or Not", NEXPO 2004.Magazine Articles
*Orebaugh, A. and Cole, E., "Intrusion Prevention and Active Response: Implementing an Open Source Defense", SysAdmin Magazine, 2005.
*Orebaugh, A. "Special Report: Cognitive Computing and Machine Learning". IANewsletter. Information Assurance Technology Analysis Center. Volume 6, Number 4. 2004.

External links

* [http://www.securityknox.com/ Securityknox] — home page


Wikimedia Foundation. 2010.

Игры ⚽ Нужна курсовая?

Look at other dictionaries:

  • Cracking of wireless networks — is the penetration of wireless networks. A wireless network can be penetrated in a number of ways. These ways vary greatly in the level of computer skill and commitment they require. Once within a network, a skilled hacker can modify software,… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”