Hart Rossman

Learn More
With funding from NSF the Department has set up a stand alone lab for students to learn penetration testing techniques(attack), to harden their networks against these attacks (defense) , and also to gather enough evidence to through careful logging and audit controls to convict a hacker (convict). Linux RedHat 7.1 was used and all the machines were set up(More)
Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation's measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses to advance the development and productive use of information technology. ITL's responsibilities(More)
R outing—the process of determining paths to move packets from source to destination— is fundamental to network operation. Everyone in IT is familiar with routers and firewalls; they're the essential components of every organization's network defense. But what about routing between organizations? Interdomain routing vulnerabilities can lead to denial of(More)
  • 1