Knowledge (XXG)

Rebecca Bace

Source 📝

237:
requirements, and accepted a job as a specialist repairing copier machines. Of the experience she stated that she faced significant gender and racial bias, and that "sometimes customers would raise a ruckus for having to deal with because they believed they had been given "second best" when showed
199:
from Alabama. Due to prevailing attitudes about the illness and about women, her neurologist suggested that she stay home and collect disability following high school. She credited a local librarian and family friend, Bertha Nel Allen, for the encouragement to apply for college and scholarships. She
212:
as the only woman in engineering. Because of financial hardship and frequent employment interruptions, she took eight years of classes at various schools to earn her degree. Bace first became interested in computing during her freshman year working with
162:
where she created the Computer Misuse and Anomaly Detection (CMAD) research program. She was known as the "den mother of computer security". She was also influential in the early stages of intelligence community
442: 305:, the investment arm of the US Intelligence Community, and before her death she served as chief strategist for the Center for Forensics, Information Technology, and Security (CFITS) at the 411: 293:
in the Computing, Information and Communications Division. She left Los Alamos in 1998 and started Infidel, Inc., a security consulting company. In 2002, she signed on as a
654:"Becky Bace, President/CEO, Infidel, Inc.; Chief Strategist for the Center for Forensics, Information Technology, and Security (CFITS) at the University of South Alabama" 1138: 341:
Multiple awards have been established in Bace's memory including the Rebecca Bace Pioneer Award for Defensive Security and the Rebecca Gurley Bace SWSIS Scholarship.
1168: 1153: 270:
research, specifically on transferring research into the relatively new commercial security products market. She played a pivotal role in the apprehension of
752: 1148: 1113: 903: 791: 550: 1143: 934: 1163: 450: 1118: 1103: 991: 419: 1158: 1123: 330: 516: 929: 1173: 1072: 986: 263: 209: 1128: 482: 1108: 1011: 1001: 705: 383: 364: 259: 278:
and capture were possible beyond the theoretical context. She also provided some of the seed funding for computer security labs at
860: 784: 290: 101: 1133: 760: 970: 996: 306: 158:(1955–2017) was an American computer security expert and pioneer in intrusion detection. She spent 12 years at the US 111: 777: 121: 87: 599: 1019: 950: 850: 573: 159: 97: 898: 819: 376:
A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony as an Expert Technical Witness
229:
and got her first engineering job while teaching at an engineering lab. She was approached by a couple of
309:. As a venture capitalist, she provided expert advice to a generation of security startups, including 1098: 1093: 965: 729: 262:. The NCSC was chartered as part of the NSA expressly to deal with computer security issues for the 878: 653: 267: 65: 834: 829: 814: 524: 322: 234: 824: 800: 379: 360: 283: 1049: 960: 883: 633: 565: 490: 764: 294: 164: 1059: 1054: 1024: 893: 298: 168: 46: 1087: 888: 868: 353: 289:
Following the death of her son, Bace went to serve as the deputy security officer at
271: 226: 201: 77: 679: 1039: 955: 275: 192: 1034: 214: 205: 1044: 908: 301:. Bace also briefly served as Technical VP of the Cyber Security Practice for 179:
Bace grew up in rural Alabama as one of seven children and was diagnosed with
757: 184: 302: 279: 255: 251: 196: 180: 107: 638: 569: 326: 218: 208:
in her senior year of high school, and in 1973 she was accepted to the
625: 250:, and while searching for a flexible job to allow her to care for her 913: 873: 318: 314: 310: 769: 412:"Rebecca 'Becky' Base: From government to guiding security startups" 266:
and the intelligence community. Bace served as program manager for
706:"Announcing the Rebecca Bace Pioneer Award for Defensive Security" 230: 222: 188: 773: 443:"Goodbye Mama Bear, the cybersecurity community will miss you" 247: 483:"IDS Den Mother: An Interview with Becky Bace — Thiemeworks" 238:
up, even though was better educated than most of the men."
200:
won scholarships from charitable foundations set up by
246:
After graduation in 1984, Bace started working at the
1010: 979: 943: 922: 859: 843: 807: 145: 137: 129: 117: 93: 83: 73: 54: 28: 21: 352: 374:Smith, Fred Chris; Bace, Rebecca Gurley (2003). 704:Allen, Courtney; Miller, Allison (2017-08-17). 785: 626:"Oral history interview with Rebecca G. Bace" 8: 930:Certified Forensic Computer Examiner (CFCE) 869:ADF Solutions Digital Evidence Investigator 476: 474: 472: 470: 468: 935:Global Information Assurance Certification 792: 778: 770: 510: 508: 171:investments in cyber security technology. 18: 1002:Australian High Tech Crime Centre (AHTCC) 637: 359:. Indianapolis, IN: Macmillan Technical. 1139:Los Alamos National Laboratory personnel 992:Department of Defense Cyber Crime Center 258:, she took an assignment in 1989 in the 600:"2014 Women in IT Security: Becky Bace" 399: 1169:21st-century American women scientists 1154:20th-century American women scientists 544: 542: 551:"Silver Bullet Talks with Becky Bace" 405: 403: 7: 558:IEEE Security & Privacy Magazine 1073:Glossary of digital forensics terms 997:National Hi-Tech Crime Unit (NHTCU) 987:National Software Reference Library 753:Computer Security History Interview 210:University of Alabama at Birmingham 195:and her father was a self-educated 1149:University of South Alabama people 1114:American women computer scientists 149:NSA Distinguished Leadership Award 14: 1144:Loyola University Maryland alumni 515:Heiser, Deborah (16 April 2017). 297:consultant at Trident Capital in 260:National Computer Security Center 254:son who was later diagnosed with 183:in adolescence. Her mother was a 125:"Den mother of computer security" 16:American computer security expert 1164:20th-century American scientists 481:Thieme, Richard (1 April 2002). 1119:National Security Agency people 1104:Writers about computer security 441:Morgan, Steve (21 March 2017). 233:technicians who needed to fill 624:Yost, Jeffrey (31 July 2012). 410:Saita, Anne (September 2003). 378:. Boston, MA: Addison-Wesley. 291:Los Alamos National Laboratory 102:Los Alamos National Laboratory 1: 658:Women in Security and Privacy 447:Cybersecurity Business Report 351:Bace, Rebecca Gurley (2000). 1159:American computer scientists 1124:American venture capitalists 598:Romeo, Jim (4 August 2014). 449:. CSO Online. Archived from 418:. TechTarget. Archived from 307:University of South Alabama 156:Rebecca "Becky" Gurley Bace 112:University of South Alabama 1190: 1174:People from Leeds, Alabama 167:and was a major player in 122:Intrusion detection system 88:Loyola University Maryland 1129:Women venture capitalists 1068: 549:McGraw, Gary (May 2007). 1109:Digital forensics people 951:Digital forensic process 851:Forensic disk controller 517:"Remembering Becky Bace" 175:Early life and education 160:National Security Agency 98:National Security Agency 971:Anti–computer forensics 820:Mobile device forensics 630:University of Minnesota 899:The Coroner's Toolkit 264:Department of Defense 1134:People with epilepsy 747:External references 570:10.1109/MSP.2007.70 487:www.thiemeworks.com 355:Intrusion Detection 268:intrusion detection 66:Birmingham, Alabama 33:Rebecca Gurley Bace 835:Software forensics 830:Database forensics 815:Computer forensics 763:2017-05-17 at the 660:. 28 December 2016 323:Arxan Technologies 235:affirmative action 1081: 1080: 825:Network forensics 801:Digital forensics 758:Podcast Interview 521:I.M.AGE Institute 284:Purdue University 153: 152: 1181: 1050:Simson Garfinkel 961:Digital evidence 956:Data acquisition 794: 787: 780: 771: 740: 739: 737: 736: 730:"SWSIS - CRA-WP" 726: 720: 719: 717: 716: 701: 695: 694: 692: 690: 676: 670: 669: 667: 665: 650: 644: 643: 641: 621: 615: 614: 612: 610: 595: 589: 588: 586: 584: 579:on 19 April 2017 578: 572:. Archived from 555: 546: 537: 536: 534: 532: 527:on 19 April 2017 523:. Archived from 512: 503: 502: 500: 498: 493:on 19 April 2017 489:. Archived from 478: 463: 462: 460: 458: 453:on 19 April 2017 438: 432: 431: 429: 427: 422:on 19 April 2017 407: 389: 370: 358: 61: 42: 40: 19: 1189: 1188: 1184: 1183: 1182: 1180: 1179: 1178: 1084: 1083: 1082: 1077: 1064: 1006: 975: 939: 918: 855: 839: 803: 798: 765:Wayback Machine 749: 744: 743: 734: 732: 728: 727: 723: 714: 712: 703: 702: 698: 688: 686: 678: 677: 673: 663: 661: 652: 651: 647: 623: 622: 618: 608: 606: 597: 596: 592: 582: 580: 576: 553: 548: 547: 540: 530: 528: 514: 513: 506: 496: 494: 480: 479: 466: 456: 454: 440: 439: 435: 425: 423: 409: 408: 401: 396: 386: 373: 367: 350: 347: 339: 295:venture capital 274:, proving that 244: 177: 165:venture capital 124: 110: 106: 104: 100: 84:Alma mater 69: 68:, United States 63: 59: 50: 49:, United States 44: 38: 36: 35: 34: 24: 17: 12: 11: 5: 1187: 1185: 1177: 1176: 1171: 1166: 1161: 1156: 1151: 1146: 1141: 1136: 1131: 1126: 1121: 1116: 1111: 1106: 1101: 1096: 1086: 1085: 1079: 1078: 1076: 1075: 1069: 1066: 1065: 1063: 1062: 1060:Robert Zeidman 1057: 1055:Clifford Stoll 1052: 1047: 1042: 1037: 1032: 1027: 1022: 1016: 1014: 1008: 1007: 1005: 1004: 999: 994: 989: 983: 981: 977: 976: 974: 973: 968: 963: 958: 953: 947: 945: 941: 940: 938: 937: 932: 926: 924: 920: 919: 917: 916: 911: 906: 901: 896: 894:The Sleuth Kit 891: 886: 881: 876: 871: 865: 863: 857: 856: 854: 853: 847: 845: 841: 840: 838: 837: 832: 827: 822: 817: 811: 809: 805: 804: 799: 797: 796: 789: 782: 774: 768: 767: 755: 748: 745: 742: 741: 721: 710:O'Reilly Media 696: 684:O'Reilly Media 680:"Rebecca Bace" 671: 645: 616: 604:SC Magazine US 590: 538: 504: 464: 433: 416:SearchSecurity 398: 397: 395: 392: 391: 390: 384: 371: 365: 346: 343: 338: 335: 299:Silicon Valley 243: 240: 176: 173: 169:Silicon Valley 151: 150: 147: 143: 142: 139: 135: 134: 131: 127: 126: 119: 118:Known for 115: 114: 95: 91: 90: 85: 81: 80: 75: 71: 70: 64: 62:(aged 61) 58:March 14, 2017 56: 52: 51: 47:Leeds, Alabama 45: 43:August 7, 1955 32: 30: 26: 25: 22: 15: 13: 10: 9: 6: 4: 3: 2: 1186: 1175: 1172: 1170: 1167: 1165: 1162: 1160: 1157: 1155: 1152: 1150: 1147: 1145: 1142: 1140: 1137: 1135: 1132: 1130: 1127: 1125: 1122: 1120: 1117: 1115: 1112: 1110: 1107: 1105: 1102: 1100: 1097: 1095: 1092: 1091: 1089: 1074: 1071: 1070: 1067: 1061: 1058: 1056: 1053: 1051: 1048: 1046: 1043: 1041: 1038: 1036: 1033: 1031: 1028: 1026: 1023: 1021: 1018: 1017: 1015: 1013: 1009: 1003: 1000: 998: 995: 993: 990: 988: 985: 984: 982: 980:Organisations 978: 972: 969: 967: 964: 962: 959: 957: 954: 952: 949: 948: 946: 942: 936: 933: 931: 928: 927: 925: 923:Certification 921: 915: 912: 910: 907: 905: 902: 900: 897: 895: 892: 890: 889:PTK Forensics 887: 885: 882: 880: 877: 875: 872: 870: 867: 866: 864: 862: 858: 852: 849: 848: 846: 842: 836: 833: 831: 828: 826: 823: 821: 818: 816: 813: 812: 810: 806: 802: 795: 790: 788: 783: 781: 776: 775: 772: 766: 762: 759: 756: 754: 751: 750: 746: 731: 725: 722: 711: 707: 700: 697: 685: 681: 675: 672: 659: 655: 649: 646: 640: 635: 631: 627: 620: 617: 605: 601: 594: 591: 575: 571: 567: 563: 559: 552: 545: 543: 539: 526: 522: 518: 511: 509: 505: 492: 488: 484: 477: 475: 473: 471: 469: 465: 452: 448: 444: 437: 434: 421: 417: 413: 406: 404: 400: 393: 387: 385:0-201-75279-4 381: 377: 372: 368: 366:1-57870-185-6 362: 357: 356: 349: 348: 344: 342: 336: 334: 332: 328: 324: 320: 316: 312: 308: 304: 300: 296: 292: 287: 285: 281: 277: 273: 272:Kevin Mitnick 269: 265: 261: 257: 253: 249: 241: 239: 236: 232: 228: 227:IBM mainframe 224: 220: 216: 211: 207: 203: 202:Betty Crocker 198: 194: 190: 186: 182: 174: 172: 170: 166: 161: 157: 148: 144: 140: 136: 132: 128: 123: 120: 116: 113: 109: 105:Infidel, Inc. 103: 99: 96: 92: 89: 86: 82: 79: 76: 72: 67: 57: 53: 48: 31: 27: 20: 1040:Eoghan Casey 1030:Rebecca Bace 1029: 733:. Retrieved 724: 713:. Retrieved 709: 699: 687:. Retrieved 683: 674: 662:. Retrieved 657: 648: 639:11299/144022 629: 619: 607:. Retrieved 603: 593: 581:. Retrieved 574:the original 561: 557: 529:. Retrieved 525:the original 520: 495:. Retrieved 491:the original 486: 455:. Retrieved 451:the original 446: 436: 424:. Retrieved 420:the original 415: 375: 354: 340: 288: 245: 217:programming 193:World War II 178: 155: 154: 141:1 (deceased) 60:(2017-03-14) 1099:2017 deaths 1094:1955 births 1035:Josh Brunty 1025:Annie Antón 215:punch cards 206:Jimmy Hoffa 94:Employer(s) 74:Nationality 1088:Categories 1045:Hany Farid 1020:Mary Aiken 966:eDiscovery 909:HashKeeper 735:2022-01-21 715:2022-01-21 564:(3): 6–9. 394:References 276:trace back 191:following 39:1955-08-07 23:Becky Bace 944:Processes 331:Neohapsis 185:war bride 133:Paul Bace 879:Foremost 861:Software 844:Hardware 808:Branches 761:Archived 689:18 April 664:18 April 609:18 April 583:18 April 531:18 April 497:18 April 457:18 April 426:18 April 303:In-Q-Tel 280:UC Davis 256:leukemia 252:autistic 197:teamster 181:epilepsy 138:Children 108:In-Q-Tel 78:American 327:HyTrust 219:Fortran 1012:People 914:Xplico 874:EnCase 382:  363:  337:Legacy 329:, and 319:iRobot 315:Sygate 311:Qualys 242:Career 225:on an 146:Awards 130:Spouse 904:COFEE 577:(PDF) 554:(PDF) 345:Books 231:Xerox 223:COBOL 189:Japan 187:from 691:2017 666:2017 611:2017 585:2017 533:2017 499:2017 459:2017 428:2017 380:ISBN 361:ISBN 282:and 221:and 204:and 55:Died 29:Born 884:FTK 634:hdl 566:doi 248:NSA 1090:: 708:. 682:. 656:. 632:. 628:. 602:. 560:. 556:. 541:^ 519:. 507:^ 485:. 467:^ 445:. 414:. 402:^ 333:. 325:, 321:, 317:, 313:, 286:. 793:e 786:t 779:v 738:. 718:. 693:. 668:. 642:. 636:: 613:. 587:. 568:: 562:5 535:. 501:. 461:. 430:. 388:. 369:. 41:) 37:(

Index

Leeds, Alabama
Birmingham, Alabama
American
Loyola University Maryland
National Security Agency
Los Alamos National Laboratory
In-Q-Tel
University of South Alabama
Intrusion detection system
National Security Agency
venture capital
Silicon Valley
epilepsy
war bride
Japan
World War II
teamster
Betty Crocker
Jimmy Hoffa
University of Alabama at Birmingham
punch cards
Fortran
COBOL
IBM mainframe
Xerox
affirmative action
NSA
autistic
leukemia
National Computer Security Center

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.