xi
About the Authors
John A. Blackley, a native of Scotland, completed his bachelors’ degree in
electrical engineering at Glasgow University in 1974. Since moving to the
United States in 1982, his career has included 19 years in information security.
John’s first information security position was with a financial services
company in Louisville, Kentucky. Starting in security administration, he gained
experience and breadth of knowledge and went on to become the Director
of Information Security and Business Contingency Planning. During that time,
John also became a member of the faculty at Eastern Kentucky University,
advising on the university’s loss prevention program.
Moving to Texas in 1992, John was Manager of Information Security and
Business Contingency Planning for one of the nation’s Fortune 100 corpora-
tions. He developed that organization’s Business Contingency Planning pro-
gram, and organized and developed every aspect of its comprehensive
information security program.
In 1995, John became a senior consultant for Europe’s largest dedicated
information security consultancy and carried out engagements for national
and multi-national organizations in such locations as Seoul, Mauritius, Brussels,
London, Lisbon, and Dublin.
Returning to Texas, John joined Netigy (now Thrupoint) as Regional Infor-
mation Security Practice Manager and went on to become Principal Security
Architect in Netigy’s Global Security Practice. John is now a member of
Peltier & Associates and manages operations in the U.S. southern states.
John has published a number of articles in the business press and has
been a speaker at conferences and seminars around the world. He teaches
on subjects such as privacy management, policy creation and implementation,
risk management, and information security awareness. In addition, John’s
classes and seminars address organization and management issues relating to
the practice of information security.
xii Managing Network Vulnerability Assessment
Justin Peltier, CISSP, MCNE, MCP, CCSE, RHCE, CCNA, is a Senior Security
Consultant with Peltier & Associates, with more than eight years of experience
in planning, designing, and implementing technical security solutions in a
wide range of operating environments. As a consultant, Justin has been
involved in implementing, supporting, and developing security solutions, and
has taught courses on many facets including vulnerability assessment and
CISSP preparation. Formerly with Suntel Services, Justin directed the security
practice development. Prior to that, he was with Netigy where he was involved
with the corporate training effort, serving as the company’s primary technical
instructor in the areas of vulnerability assessment, risk analysis, virtual private
networking, policies and procedures, and penetration testing. Mr. Peltier has
lead classes for MIS, Netigy, Computer Security Institute, Suntel Services, and
Sherwood Associates. He has expert-level experience with projects related to
Novell, NT, Sun Solaris, Linux, and Netscape systems, as well as with Ethernet,
Token Ring, TCP/IP, and IPX/SPX topologies and protocols. Mr. Peltier’s CBK
specialty domains include Telecommunications and Network Security; Cryp-
tography; Access Control Systems and Methodologies; and Security Architecture
and Models.
Tom Peltier is in his fifth decade of computer technology. During this time
he has shared his experiences with fellow professionals and, because of his
work, was given the 1993 Computer Security Institute’s (CSI) Lifetime Achieve-
ment Award. In 1999, the Information Systems Security Association (ISSA)
bestowed its Individual Contribution to the Profession Award and in 2001 he
was inducted into the ISSA Hall of Fame. Tom was also awarded the CSI
Lifetime Emeritus Membership Award. He began his career five decades ago
as an operator, moving on to become an applications programmer and systems
programmer, systems analyst, and information systems security officer. Cur-
rently, he is the president of Peltier & Associates, an information security
training firm. Prior to this he was Director of Policies and Administration for
Netigy’s Global Security Practice. Tom was the National Director for Consulting
Services for CyberSafe Corporation, and the Corporate Information Protection
Coordinator for Detroit Edison. This program has been recognized for excel-
lence in the field of computer and information security by winning the
Computer Security Institute’s Information Security Program of the Year for
1996. Tom previously was the Information Security Specialist for General
Motors Corporation, responsible for implementing an information security
program for GM’s worldwide activities.
Over the past decade, Tom has averaged four published articles a year on
various computer and information security issues, including developing poli-
cies and procedures, disaster recovery planning, copyright compliance, virus
management, and security controls. He has had four books published: Policies,
Standards, Guidelines and Procedures: Information Security Risk Analysis;
Information System Security Policies and Procedures: A Practitioners’ Refer-
ence; The Complete Manual of Policies and Procedures for Data Security and
About the Authors xiii
is the co-editor and contributing author for the CISSP Prep for Success Hand-
book; and a contributing author for the Computer Security Handbook, 3rd and
5th editions, and Data Security Management.
Tom has been the technical advisor on a number of security films from
Commonwealth Films. He is the past chairman of the Computer Security
Institute (CSI) advisory council, the chairman of the 18th Annual CSI Confer-
ence, founder and past-president of the Southeast Michigan Computer Security
Special Interest Group, and a former member of the board of directors for
(ISC)
2
, the security professional certification organization. He conducts numer-
ous seminars and workshops on various security topics and has led seminars
for CSI, Crisis Management, American Institute of Banking, the American
Institute of Certified Public Accountants, Institute of Internal Auditors, ISACA,
and Sungard Planning Solutions. Tom was also an instructor at the graduate
level for Eastern Michigan University.
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset