Hart Rossman

Learn More
With funding from NSF the Department has set up a stand alone lab for students to learn penetration testing techniques(attack), to harden their networks against these attacks (defense) , and also to gather enough evidence to through careful logging and audit controls to convict a hacker (convict). Linux RedHat 7.1 was used and all the machines were set up(More)
R outing—the process of determining paths to move packets from source to destination— is fundamental to network op­ eration. Everyone in IT is familiar with routers and firewalls; they're the essential components of every organization's network defense. But what about routing between organizations? Interdomain rout­ ing vulnerabilities can lead to de­ nial(More)
  • 1