237:
requirements, and accepted a job as a specialist repairing copier machines. Of the experience she stated that she faced significant gender and racial bias, and that "sometimes customers would raise a ruckus for having to deal with because they believed they had been given "second best" when showed
199:
from
Alabama. Due to prevailing attitudes about the illness and about women, her neurologist suggested that she stay home and collect disability following high school. She credited a local librarian and family friend, Bertha Nel Allen, for the encouragement to apply for college and scholarships. She
212:
as the only woman in engineering. Because of financial hardship and frequent employment interruptions, she took eight years of classes at various schools to earn her degree. Bace first became interested in computing during her freshman year working with
162:
where she created the
Computer Misuse and Anomaly Detection (CMAD) research program. She was known as the "den mother of computer security". She was also influential in the early stages of intelligence community
442:
305:, the investment arm of the US Intelligence Community, and before her death she served as chief strategist for the Center for Forensics, Information Technology, and Security (CFITS) at the
411:
293:
in the
Computing, Information and Communications Division. She left Los Alamos in 1998 and started Infidel, Inc., a security consulting company. In 2002, she signed on as a
654:"Becky Bace, President/CEO, Infidel, Inc.; Chief Strategist for the Center for Forensics, Information Technology, and Security (CFITS) at the University of South Alabama"
1138:
341:
Multiple awards have been established in Bace's memory including the
Rebecca Bace Pioneer Award for Defensive Security and the Rebecca Gurley Bace SWSIS Scholarship.
1168:
1153:
270:
research, specifically on transferring research into the relatively new commercial security products market. She played a pivotal role in the apprehension of
752:
1148:
1113:
903:
791:
550:
1143:
934:
1163:
450:
1118:
1103:
991:
419:
1158:
1123:
330:
516:
929:
1173:
1072:
986:
263:
209:
1128:
482:
1108:
1011:
1001:
705:
383:
364:
259:
278:
and capture were possible beyond the theoretical context. She also provided some of the seed funding for computer security labs at
860:
784:
290:
101:
1133:
760:
970:
996:
306:
158:(1955–2017) was an American computer security expert and pioneer in intrusion detection. She spent 12 years at the US
111:
777:
121:
87:
599:
1019:
950:
850:
573:
159:
97:
898:
819:
376:
A Guide to
Forensic Testimony: The Art and Practice of Presenting Testimony as an Expert Technical Witness
229:
and got her first engineering job while teaching at an engineering lab. She was approached by a couple of
309:. As a venture capitalist, she provided expert advice to a generation of security startups, including
1098:
1093:
965:
729:
262:. The NCSC was chartered as part of the NSA expressly to deal with computer security issues for the
878:
653:
267:
65:
834:
829:
814:
524:
322:
234:
824:
800:
379:
360:
283:
1049:
960:
883:
633:
565:
490:
764:
294:
164:
1059:
1054:
1024:
893:
298:
168:
46:
1087:
888:
868:
353:
289:
Following the death of her son, Bace went to serve as the deputy security officer at
271:
226:
201:
77:
679:
1039:
955:
275:
192:
1034:
214:
205:
1044:
908:
301:. Bace also briefly served as Technical VP of the Cyber Security Practice for
179:
Bace grew up in rural
Alabama as one of seven children and was diagnosed with
757:
184:
302:
279:
255:
251:
196:
180:
107:
638:
569:
326:
218:
208:
in her senior year of high school, and in 1973 she was accepted to the
625:
250:, and while searching for a flexible job to allow her to care for her
913:
873:
318:
314:
310:
769:
412:"Rebecca 'Becky' Base: From government to guiding security startups"
266:
and the intelligence community. Bace served as program manager for
706:"Announcing the Rebecca Bace Pioneer Award for Defensive Security"
230:
222:
188:
773:
443:"Goodbye Mama Bear, the cybersecurity community will miss you"
247:
483:"IDS Den Mother: An Interview with Becky Bace — Thiemeworks"
238:
up, even though was better educated than most of the men."
200:
won scholarships from charitable foundations set up by
246:
After graduation in 1984, Bace started working at the
1010:
979:
943:
922:
859:
843:
807:
145:
137:
129:
117:
93:
83:
73:
54:
28:
21:
352:
374:Smith, Fred Chris; Bace, Rebecca Gurley (2003).
704:Allen, Courtney; Miller, Allison (2017-08-17).
785:
626:"Oral history interview with Rebecca G. Bace"
8:
930:Certified Forensic Computer Examiner (CFCE)
869:ADF Solutions Digital Evidence Investigator
476:
474:
472:
470:
468:
935:Global Information Assurance Certification
792:
778:
770:
510:
508:
171:investments in cyber security technology.
18:
1002:Australian High Tech Crime Centre (AHTCC)
637:
359:. Indianapolis, IN: Macmillan Technical.
1139:Los Alamos National Laboratory personnel
992:Department of Defense Cyber Crime Center
258:, she took an assignment in 1989 in the
600:"2014 Women in IT Security: Becky Bace"
399:
1169:21st-century American women scientists
1154:20th-century American women scientists
544:
542:
551:"Silver Bullet Talks with Becky Bace"
405:
403:
7:
558:IEEE Security & Privacy Magazine
1073:Glossary of digital forensics terms
997:National Hi-Tech Crime Unit (NHTCU)
987:National Software Reference Library
753:Computer Security History Interview
210:University of Alabama at Birmingham
195:and her father was a self-educated
1149:University of South Alabama people
1114:American women computer scientists
149:NSA Distinguished Leadership Award
14:
1144:Loyola University Maryland alumni
515:Heiser, Deborah (16 April 2017).
297:consultant at Trident Capital in
260:National Computer Security Center
254:son who was later diagnosed with
183:in adolescence. Her mother was a
125:"Den mother of computer security"
16:American computer security expert
1164:20th-century American scientists
481:Thieme, Richard (1 April 2002).
1119:National Security Agency people
1104:Writers about computer security
441:Morgan, Steve (21 March 2017).
233:technicians who needed to fill
624:Yost, Jeffrey (31 July 2012).
410:Saita, Anne (September 2003).
378:. Boston, MA: Addison-Wesley.
291:Los Alamos National Laboratory
102:Los Alamos National Laboratory
1:
658:Women in Security and Privacy
447:Cybersecurity Business Report
351:Bace, Rebecca Gurley (2000).
1159:American computer scientists
1124:American venture capitalists
598:Romeo, Jim (4 August 2014).
449:. CSO Online. Archived from
418:. TechTarget. Archived from
307:University of South Alabama
156:Rebecca "Becky" Gurley Bace
112:University of South Alabama
1190:
1174:People from Leeds, Alabama
167:and was a major player in
122:Intrusion detection system
88:Loyola University Maryland
1129:Women venture capitalists
1068:
549:McGraw, Gary (May 2007).
1109:Digital forensics people
951:Digital forensic process
851:Forensic disk controller
517:"Remembering Becky Bace"
175:Early life and education
160:National Security Agency
98:National Security Agency
971:Anti–computer forensics
820:Mobile device forensics
630:University of Minnesota
899:The Coroner's Toolkit
264:Department of Defense
1134:People with epilepsy
747:External references
570:10.1109/MSP.2007.70
487:www.thiemeworks.com
355:Intrusion Detection
268:intrusion detection
66:Birmingham, Alabama
33:Rebecca Gurley Bace
835:Software forensics
830:Database forensics
815:Computer forensics
763:2017-05-17 at the
660:. 28 December 2016
323:Arxan Technologies
235:affirmative action
1081:
1080:
825:Network forensics
801:Digital forensics
758:Podcast Interview
521:I.M.AGE Institute
284:Purdue University
153:
152:
1181:
1050:Simson Garfinkel
961:Digital evidence
956:Data acquisition
794:
787:
780:
771:
740:
739:
737:
736:
730:"SWSIS - CRA-WP"
726:
720:
719:
717:
716:
701:
695:
694:
692:
690:
676:
670:
669:
667:
665:
650:
644:
643:
641:
621:
615:
614:
612:
610:
595:
589:
588:
586:
584:
579:on 19 April 2017
578:
572:. Archived from
555:
546:
537:
536:
534:
532:
527:on 19 April 2017
523:. Archived from
512:
503:
502:
500:
498:
493:on 19 April 2017
489:. Archived from
478:
463:
462:
460:
458:
453:on 19 April 2017
438:
432:
431:
429:
427:
422:on 19 April 2017
407:
389:
370:
358:
61:
42:
40:
19:
1189:
1188:
1184:
1183:
1182:
1180:
1179:
1178:
1084:
1083:
1082:
1077:
1064:
1006:
975:
939:
918:
855:
839:
803:
798:
765:Wayback Machine
749:
744:
743:
734:
732:
728:
727:
723:
714:
712:
703:
702:
698:
688:
686:
678:
677:
673:
663:
661:
652:
651:
647:
623:
622:
618:
608:
606:
597:
596:
592:
582:
580:
576:
553:
548:
547:
540:
530:
528:
514:
513:
506:
496:
494:
480:
479:
466:
456:
454:
440:
439:
435:
425:
423:
409:
408:
401:
396:
386:
373:
367:
350:
347:
339:
295:venture capital
274:, proving that
244:
177:
165:venture capital
124:
110:
106:
104:
100:
84:Alma mater
69:
68:, United States
63:
59:
50:
49:, United States
44:
38:
36:
35:
34:
24:
17:
12:
11:
5:
1187:
1185:
1177:
1176:
1171:
1166:
1161:
1156:
1151:
1146:
1141:
1136:
1131:
1126:
1121:
1116:
1111:
1106:
1101:
1096:
1086:
1085:
1079:
1078:
1076:
1075:
1069:
1066:
1065:
1063:
1062:
1060:Robert Zeidman
1057:
1055:Clifford Stoll
1052:
1047:
1042:
1037:
1032:
1027:
1022:
1016:
1014:
1008:
1007:
1005:
1004:
999:
994:
989:
983:
981:
977:
976:
974:
973:
968:
963:
958:
953:
947:
945:
941:
940:
938:
937:
932:
926:
924:
920:
919:
917:
916:
911:
906:
901:
896:
894:The Sleuth Kit
891:
886:
881:
876:
871:
865:
863:
857:
856:
854:
853:
847:
845:
841:
840:
838:
837:
832:
827:
822:
817:
811:
809:
805:
804:
799:
797:
796:
789:
782:
774:
768:
767:
755:
748:
745:
742:
741:
721:
710:O'Reilly Media
696:
684:O'Reilly Media
680:"Rebecca Bace"
671:
645:
616:
604:SC Magazine US
590:
538:
504:
464:
433:
416:SearchSecurity
398:
397:
395:
392:
391:
390:
384:
371:
365:
346:
343:
338:
335:
299:Silicon Valley
243:
240:
176:
173:
169:Silicon Valley
151:
150:
147:
143:
142:
139:
135:
134:
131:
127:
126:
119:
118:Known for
115:
114:
95:
91:
90:
85:
81:
80:
75:
71:
70:
64:
62:(aged 61)
58:March 14, 2017
56:
52:
51:
47:Leeds, Alabama
45:
43:August 7, 1955
32:
30:
26:
25:
22:
15:
13:
10:
9:
6:
4:
3:
2:
1186:
1175:
1172:
1170:
1167:
1165:
1162:
1160:
1157:
1155:
1152:
1150:
1147:
1145:
1142:
1140:
1137:
1135:
1132:
1130:
1127:
1125:
1122:
1120:
1117:
1115:
1112:
1110:
1107:
1105:
1102:
1100:
1097:
1095:
1092:
1091:
1089:
1074:
1071:
1070:
1067:
1061:
1058:
1056:
1053:
1051:
1048:
1046:
1043:
1041:
1038:
1036:
1033:
1031:
1028:
1026:
1023:
1021:
1018:
1017:
1015:
1013:
1009:
1003:
1000:
998:
995:
993:
990:
988:
985:
984:
982:
980:Organisations
978:
972:
969:
967:
964:
962:
959:
957:
954:
952:
949:
948:
946:
942:
936:
933:
931:
928:
927:
925:
923:Certification
921:
915:
912:
910:
907:
905:
902:
900:
897:
895:
892:
890:
889:PTK Forensics
887:
885:
882:
880:
877:
875:
872:
870:
867:
866:
864:
862:
858:
852:
849:
848:
846:
842:
836:
833:
831:
828:
826:
823:
821:
818:
816:
813:
812:
810:
806:
802:
795:
790:
788:
783:
781:
776:
775:
772:
766:
762:
759:
756:
754:
751:
750:
746:
731:
725:
722:
711:
707:
700:
697:
685:
681:
675:
672:
659:
655:
649:
646:
640:
635:
631:
627:
620:
617:
605:
601:
594:
591:
575:
571:
567:
563:
559:
552:
545:
543:
539:
526:
522:
518:
511:
509:
505:
492:
488:
484:
477:
475:
473:
471:
469:
465:
452:
448:
444:
437:
434:
421:
417:
413:
406:
404:
400:
393:
387:
385:0-201-75279-4
381:
377:
372:
368:
366:1-57870-185-6
362:
357:
356:
349:
348:
344:
342:
336:
334:
332:
328:
324:
320:
316:
312:
308:
304:
300:
296:
292:
287:
285:
281:
277:
273:
272:Kevin Mitnick
269:
265:
261:
257:
253:
249:
241:
239:
236:
232:
228:
227:IBM mainframe
224:
220:
216:
211:
207:
203:
202:Betty Crocker
198:
194:
190:
186:
182:
174:
172:
170:
166:
161:
157:
148:
144:
140:
136:
132:
128:
123:
120:
116:
113:
109:
105:Infidel, Inc.
103:
99:
96:
92:
89:
86:
82:
79:
76:
72:
67:
57:
53:
48:
31:
27:
20:
1040:Eoghan Casey
1030:Rebecca Bace
1029:
733:. Retrieved
724:
713:. Retrieved
709:
699:
687:. Retrieved
683:
674:
662:. Retrieved
657:
648:
639:11299/144022
629:
619:
607:. Retrieved
603:
593:
581:. Retrieved
574:the original
561:
557:
529:. Retrieved
525:the original
520:
495:. Retrieved
491:the original
486:
455:. Retrieved
451:the original
446:
436:
424:. Retrieved
420:the original
415:
375:
354:
340:
288:
245:
217:programming
193:World War II
178:
155:
154:
141:1 (deceased)
60:(2017-03-14)
1099:2017 deaths
1094:1955 births
1035:Josh Brunty
1025:Annie Antón
215:punch cards
206:Jimmy Hoffa
94:Employer(s)
74:Nationality
1088:Categories
1045:Hany Farid
1020:Mary Aiken
966:eDiscovery
909:HashKeeper
735:2022-01-21
715:2022-01-21
564:(3): 6–9.
394:References
276:trace back
191:following
39:1955-08-07
23:Becky Bace
944:Processes
331:Neohapsis
185:war bride
133:Paul Bace
879:Foremost
861:Software
844:Hardware
808:Branches
761:Archived
689:18 April
664:18 April
609:18 April
583:18 April
531:18 April
497:18 April
457:18 April
426:18 April
303:In-Q-Tel
280:UC Davis
256:leukemia
252:autistic
197:teamster
181:epilepsy
138:Children
108:In-Q-Tel
78:American
327:HyTrust
219:Fortran
1012:People
914:Xplico
874:EnCase
382:
363:
337:Legacy
329:, and
319:iRobot
315:Sygate
311:Qualys
242:Career
225:on an
146:Awards
130:Spouse
904:COFEE
577:(PDF)
554:(PDF)
345:Books
231:Xerox
223:COBOL
189:Japan
187:from
691:2017
666:2017
611:2017
585:2017
533:2017
499:2017
459:2017
428:2017
380:ISBN
361:ISBN
282:and
221:and
204:and
55:Died
29:Born
884:FTK
634:hdl
566:doi
248:NSA
1090::
708:.
682:.
656:.
632:.
628:.
602:.
560:.
556:.
541:^
519:.
507:^
485:.
467:^
445:.
414:.
402:^
333:.
325:,
321:,
317:,
313:,
286:.
793:e
786:t
779:v
738:.
718:.
693:.
668:.
642:.
636::
613:.
587:.
568::
562:5
535:.
501:.
461:.
430:.
388:.
369:.
41:)
37:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.