Jonathan Grier

Jonathan Grier is a computer scientist, consultant, and entrepreneur. He is best known for his work on stochastic forensics and insider data theft.[1][2][3][4] He has also contributed to computer security, digital forensics, and software development.[1][4][5]

Jonathan Grier
NationalityUnited States
Known forStochastic forensics
Scientific career
FieldsComputer Science

Grier is a frequent speaker at computer conferences such as Black Hat, ACSAC, and DFRWS.[6][7][8][9] His research has appeared in the Journal of Digital Investigation, SecurityFocus, Digital Forensics Magazine and InformationWeek.[1][2][5] His work has been cited by Microsoft Press, IBM Internet Security Systems, Hewlett-Packard, SC Magazine and the FBI National Infrastructure Protection Center.[4][10][11][12][13][14][15]

Grier is an advisor to private clients in computer security, software development and information technology,[4] and conducts training in computer security and forensics for private clients and the Department of Defense Cyber Crime Center.[16]

Research

In 2010, Grier introduced stochastic forensics as an alternative to traditional digital forensics which typically relies on digital artifacts.[2] Stochastic forensics' chief application is investigation of data theft, especially by insiders.[2] Grier was inspired by the statistical mechanics method used in physics.[5]

In 2001, Grier exposed several security flaws in a number of techniques then popular in Common Gateway Interface web applications.[11] This was a contributing factor in the move from flat file databases to modern database management systems.[17]

Other

Grier is a member of the Association of Orthodox Jewish Scientists, where he lectures on the intersection of Halakha with computer science and physics.[18]

In 1994, Yeshiva University named Grier a Yeshiva University Distinguished Scholar.

References

  1. Grier, Jonathan (2011). "Detecting data theft using stochastic forensics". Journal of Digital Investigation. 8(Supplement), S71-S77.
  2. Schwartz, Mathew J. (December 13, 2011)."How Digital Forensics Detects Insider Theft". InformationWeek.
  3. Chickowski, Ericka (June 26, 2012). "New Forensics Method May Nab Insider Thieves". Dark Reading.
  4. "Insider Threat Spotlight". (August 2012). SC Magazine
  5. Grier, Jonathan (May 2012). "Investigating Data Theft with Stochastic Forensics". "Digital Forensics Magazine."
  6. Black Hat Briefings, USA 2012.Catching Insider Data Theft with Stochastic Forensics Archived 2013-12-14 at the Wayback Machine.
  7. ACSAC,. ACSAC 2012 Program.
  8. ACSAC, ACSAC 2011 Program.
  9. DFRWS, DFRWS 2011 Agenda Archived 2013-03-14 at the Wayback Machine.
  10. Howard, Michael and David LeBlanc (2001). Writing Secure Code. Microsoft Press
  11. IBM Internet Security Systems (2001). Xforce Database.
  12. Hewlett-Packard (2010-09-15). HP Security Bulletin. Accessed 2013-02-08.
  13. FBI National Infrastructure Protection Center (2001). Cybernotes. Issue 2001-8.
  14. FBI National Infrastructure Protection Center (2001). Cybernotes. Issue 2001-10.
  15. FBI National Infrastructure Protection Center (2001). Cybernotes. Issue 2001-15.
  16. Department of Defense Cyber Crime Center, 2012 DC3 Agenda.
  17. SecurityWatch (July 12, 2001). Get Ready for the CGI updates!
  18. Association of Orthodox Jewish Scientists, AOJS 2012 Summer Convention Program.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.