Hart Rossman

Learn More
With funding from NSF the Department has set up a stand alone lab for students to learn penetration testing techniques(attack), to harden their networks against these attacks (defense) , and also to gather enough evidence to through careful logging and audit controls to convict a hacker (convict). Linux RedHat 7.1 was used and all the machines were set up(More)
Safe and effective use of hyperthermia for the treatment of brain tumors requires precise control of the distribution of temperatures (that is, the thermal field) within the tumor and within the adjacent brain. Major influences upon the distribution of temperatures include the passive thermal properties of the brain, such as its specific heat (Cb), and the(More)
O ur goal, of course, is to offer ideas to improve IT security, both by looking at ways it can go wrong as well as by covering good practices. As most security practitioners and researchers have seen, new technology develop­ ments nearly always introduce a period in which attackers find relatively easy ways to exploit weaknesses, followed by a gradual(More)
R outing—the process of determining paths to move packets from source to destination— is fundamental to network op­ eration. Everyone in IT is familiar with routers and firewalls; they’re the essential components of every organization’s network defense. But what about routing between organizations? Interdomain rout­ ing vulnerabilities can lead to de­ nial(More)
I T systems have long been at risk from vulnerable soft­ ware, malicious actions, or inadvertent user errors, in ad­ dition to run-of-the-mill natural and human-made disasters. As we discussed in the last issue (“Sur­ viving Insecure IT: Effective Patch Management,” pp. 49–51), effec­ tive patch management is essential for shoring up security vulnerabil­(More)
  • 1