Jump to content

Rebecca Bace: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
+ cat.
m cite repair;
Line 13: Line 13:
| alma_mater = [[Loyola University Maryland]]
| alma_mater = [[Loyola University Maryland]]
| occupation =
| occupation =
| employer = [[National Security Agency]]<br>[[Los Alamos National Laboratory]]<br>Infidel, Inc.<br>[[In-Q-Tel]]<br>[[University of South Alabama]]
| employer = [[National Security Agency]]<br />[[Los Alamos National Laboratory]]<br />Infidel, Inc.<br />[[In-Q-Tel]]<br />[[University of South Alabama]]
| known_for = [[Intrusion detection system]]<br>"Den mother of computer security"
| known_for = [[Intrusion detection system]]<br />"Den mother of computer security"
| term =
| term =
| successor =
| successor =
Line 24: Line 24:
}}
}}
'''Rebecca "Becky" Gurley Bace''' (1955–2017) was an American computer security expert and pioneer in intrusion detection. She spent 12 years at the US [[National Security Agency]] where she created the Computer Misuse and Anomaly Detection
'''Rebecca "Becky" Gurley Bace''' (1955–2017) was an American computer security expert and pioneer in intrusion detection. She spent 12 years at the US [[National Security Agency]] where she created the Computer Misuse and Anomaly Detection
(CMAD) research program. She was known as the "den mother of computer security".<ref name="den">{{cite web|last1=Saita|first1=Anne|title=Rebecca 'Becky' Base: From government to guiding security startups|url=http://searchsecurity.techtarget.com/feature/Rebecca-Becky-Base-From-government-to-guiding-security-startups|website=SearchSecurity|publisher=TechTarget|accessdate=18 April 2017|date=September 2003}}</ref> She was also influential in the early stages of intelligence community [[venture capital]] and was a major player in [[Silicon Valley]] investments in cyber security technology.<ref>{{cite web|last1=Morgan|first1=Steve|title=Goodbye Mama Bear, the cybersecurity community will miss you|url=http://www.csoonline.com/article/3183459/security/goodbye-becky-bace-the-cybersecurity-community-will-miss-you.html|website=Cybersecurity Business Report|publisher=CSO Online|accessdate=18 April 2017|language=en|date=21 March 2017}}</ref>
(CMAD) research program. She was known as the "den mother of computer security".<ref name="den">{{cite web|last1=Saita|first1=Anne|title=Rebecca 'Becky' Base: From government to guiding security startups|url=http://searchsecurity.techtarget.com/feature/Rebecca-Becky-Base-From-government-to-guiding-security-startups|website=SearchSecurity|publisher=TechTarget|access-date=18 April 2017|date=September 2003}}</ref> She was also influential in the early stages of intelligence community [[venture capital]] and was a major player in [[Silicon Valley]] investments in cyber security technology.<ref>{{cite web|last1=Morgan|first1=Steve|title=Goodbye Mama Bear, the cybersecurity community will miss you|url=http://www.csoonline.com/article/3183459/security/goodbye-becky-bace-the-cybersecurity-community-will-miss-you.html|website=Cybersecurity Business Report|publisher=CSO Online|access-date=18 April 2017|language=en|date=21 March 2017}}</ref>


==Early life and education==
==Early life and education==
Bace grew up in rural Alabama as one of seven children and was diagnosed with [[epilepsy]] in adolescence. Her mother was a [[war bride]] from [[Japan]] following [[World War II]] and her father was a self-educated [[teamster]] from Alabama.<ref name="interview">{{cite web|last1=Thieme|first1=Richard|title=IDS Den Mother: An Interview with Becky Bace — Thiemeworks|url=http://www.thiemeworks.com/an-interview-with-becky-bace/|website=www.thiemeworks.com|accessdate=18 April 2017|date=1 April 2002}}</ref> Due to prevailing attitudes about the illness and about women, her neurologist suggested that she stay home and collect disability following high school.<ref name="memorium">{{cite web|last1=Heiser|first1=Deborah|title=Remembering Becky Bace|url=http://www.deborahheiser.com/single-post/2016/11/07/Becky-Bace|website=I.M.AGE Institute|accessdate=18 April 2017|date=16 April 2017}}</ref> She credited a local librarian and family friend, Bertha Nel Allen, for the encouragement to apply for college and scholarships. She won scholarships from charitable foundations set up by [[Betty Crocker]] and [[Jimmy Hoffa]] in her senior year of high school, and in 1973 she was accepted to the [[University of Alabama at Birmingham]] as the only woman in engineering.<ref name="interview"/> Because of financial hardship and frequent employment interruptions, she took eight years of classes at various schools to earn her degree.<ref name="ieee">{{cite journal|last1=McGraw|first1=Gary|title=Silver Bullet Talks with Becky Bace|journal=IEEE Security & Privacy Magazine|date=May 2007|volume=5|issue=3|pages=6–9|doi=10.1109/MSP.2007.70|url=https://www.cigital.com/silver-bullet-files/shows/silverbullet-012-bbace.pdf|accessdate=18 April 2017}}</ref> Bace first became interested in computing during her freshman year working with [[punch cards]] programming [[Fortran]] and [[COBOL]] on an [[IBM mainframe]] and got her first engineering job while teaching at an engineering lab. She was approached by a couple of [[Xerox]] technicians who needed to fill [[affirmative action]] requirements, and accepted a job as a specialist repairing copier machines.<ref name="interview"/> Of the experience she stated that she faced significant gender and racial bias, and that "sometimes customers would raise a ruckus for having to deal with [her] because they believed they had been given "second best" when [she] showed up, even though [she] was better educated than most of the men."<ref name="interview"/>
Bace grew up in rural Alabama as one of seven children and was diagnosed with [[epilepsy]] in adolescence. Her mother was a [[war bride]] from [[Japan]] following [[World War II]] and her father was a self-educated [[teamster]] from Alabama.<ref name="interview">{{cite web|last1=Thieme|first1=Richard|title=IDS Den Mother: An Interview with Becky Bace — Thiemeworks|url=http://www.thiemeworks.com/an-interview-with-becky-bace/|website=www.thiemeworks.com|access-date=18 April 2017|date=1 April 2002}}</ref> Due to prevailing attitudes about the illness and about women, her neurologist suggested that she stay home and collect disability following high school.<ref name="memorium">{{cite web|last1=Heiser|first1=Deborah|title=Remembering Becky Bace|url=http://www.deborahheiser.com/single-post/2016/11/07/Becky-Bace|website=I.M.AGE Institute|access-date=18 April 2017|date=16 April 2017}}</ref> She credited a local librarian and family friend, Bertha Nel Allen, for the encouragement to apply for college and scholarships. She won scholarships from charitable foundations set up by [[Betty Crocker]] and [[Jimmy Hoffa]] in her senior year of high school, and in 1973 she was accepted to the [[University of Alabama at Birmingham]] as the only woman in engineering.<ref name="interview"/> Because of financial hardship and frequent employment interruptions, she took eight years of classes at various schools to earn her degree.<ref name="ieee">{{cite journal|last1=McGraw|first1=Gary|title=Silver Bullet Talks with Becky Bace|journal=IEEE Security & Privacy Magazine|date=May 2007|volume=5|issue=3|pages=6–9|doi=10.1109/MSP.2007.70|url=https://www.cigital.com/silver-bullet-files/shows/silverbullet-012-bbace.pdf|access-date=18 April 2017}}</ref> Bace first became interested in computing during her freshman year working with [[punch cards]] programming [[Fortran]] and [[COBOL]] on an [[IBM mainframe]] and got her first engineering job while teaching at an engineering lab. She was approached by a couple of [[Xerox]] technicians who needed to fill [[affirmative action]] requirements, and accepted a job as a specialist repairing copier machines.<ref name="interview"/> Of the experience she stated that she faced significant gender and racial bias, and that "sometimes customers would raise a ruckus for having to deal with [her] because they believed they had been given "second best" when [she] showed up, even though [she] was better educated than most of the men."<ref name="interview"/>


==Career==
==Career==
After graduation in 1984, Bace started working at the [[NSA]], and while searching for a flexible job to allow her to care for her [[autistic]] son who was later diagnosed with [[leukemia]], she took an assignment in 1989 in the [[National Computer Security Center]].<ref name="memorium"/> The NCSC was chartered as part of the NSA expressly to deal with computer security issues for the [[United States Department of Defense|Department of Defense]] and the intelligence community. Bace served as program manager for [[intrusion detection]] research, specifically on transferring research into the relatively new commercial security products market.<ref>{{cite web|last1=Romeo|first1=Jim|title=2014 Women in IT Security: Becky Bace|url=https://www.scmagazine.com/2014-women-in-it-security-becky-bace/article/540088/|website=SC Magazine US|accessdate=18 April 2017|language=en|date=4 August 2014}}</ref> She played a pivotal role in the apprehension of [[Kevin Mitnick]], proving that [[IP traceback|trace back]] and capture were possible beyond the theoretical context.<ref name="ieee"/> She also provided some of the seed funding for computer security labs at [[UC Davis]] and [[Purdue University]].<ref name="den"/>
After graduation in 1984, Bace started working at the [[NSA]], and while searching for a flexible job to allow her to care for her [[autistic]] son who was later diagnosed with [[leukemia]], she took an assignment in 1989 in the [[National Computer Security Center]].<ref name="memorium"/> The NCSC was chartered as part of the NSA expressly to deal with computer security issues for the [[United States Department of Defense|Department of Defense]] and the intelligence community. Bace served as program manager for [[intrusion detection]] research, specifically on transferring research into the relatively new commercial security products market.<ref>{{cite web|last1=Romeo|first1=Jim|title=2014 Women in IT Security: Becky Bace|url=https://www.scmagazine.com/2014-women-in-it-security-becky-bace/article/540088/|website=SC Magazine US|access-date=18 April 2017|language=en|date=4 August 2014}}</ref> She played a pivotal role in the apprehension of [[Kevin Mitnick]], proving that [[IP traceback|trace back]] and capture were possible beyond the theoretical context.<ref name="ieee"/> She also provided some of the seed funding for computer security labs at [[UC Davis]] and [[Purdue University]].<ref name="den"/>


Following the death of her son, Bace went to serve as the deputy security officer at [[Los Alamos National Laboratory]] in the Computing, Information and Communications Division.<ref>{{cite document|last1=Yost|first1=Jeffrey|title=An Interview with Rebecca G. Bace|publisher=Charles Babbage Institute|date=31 July 2012|hdl=11299/144022}}</ref> She left Los Alamos in 1998 and started Infidel, Inc., a security consulting company.<ref name="interview"/> In 2002, she signed on as a [[venture capital]] consultant at Trident Capital in [[Silicon Valley]]. Bace also briefly served as Technical VP of the Cyber Security Practice for [[In-Q-Tel]], the investment arm of the US Intelligence Community, and before her death she served as chief strategist for the Center for Forensics, Information Technology, and Security (CFITS) at the [[University of South Alabama]].<ref>{{cite web|title=Becky Bace, President/CEO, Infidel, Inc.; Chief Strategist for the Center for Forensics, Information Technology, and Security (CFITS) at the University of South Alabama|url=https://www.wisporg.com/blog-posts/2016/12/26/becky-bace-article|website=Women in Security and Privacy|accessdate=18 April 2017|date=28 December 2016}}</ref> As a venture capitalist, she provided expert advice to a generation of security startups, including [[Qualys]], [[Sygate]], [[iRobot]], [[Arxan Technologies]], [[HyTrust]], and [[List of acquisitions by Cisco Systems|Neohapsis]].<ref>{{cite web|title=Rebecca Bace|url=https://www.oreilly.com/people/716f8-rebecca-bace|website=O'Reilly Media|accessdate=18 April 2017|language=en}}</ref>
Following the death of her son, Bace went to serve as the deputy security officer at [[Los Alamos National Laboratory]] in the Computing, Information and Communications Division.<ref>{{cite web |last1=Yost|first1=Jeffrey|title=Oral history interview with Rebecca G. Bace |website=University of Minnesota |date=31 July 2012 |url=https://hdl.handle.net/11299/144022 |hdl=11299/144022 |hdl-access=free}}</ref> She left Los Alamos in 1998 and started Infidel, Inc., a security consulting company.<ref name="interview"/> In 2002, she signed on as a [[venture capital]] consultant at Trident Capital in [[Silicon Valley]]. Bace also briefly served as Technical VP of the Cyber Security Practice for [[In-Q-Tel]], the investment arm of the US Intelligence Community, and before her death she served as chief strategist for the Center for Forensics, Information Technology, and Security (CFITS) at the [[University of South Alabama]].<ref>{{cite web|title=Becky Bace, President/CEO, Infidel, Inc.; Chief Strategist for the Center for Forensics, Information Technology, and Security (CFITS) at the University of South Alabama|url=https://www.wisporg.com/blog-posts/2016/12/26/becky-bace-article|website=Women in Security and Privacy|access-date=18 April 2017|date=28 December 2016}}</ref> As a venture capitalist, she provided expert advice to a generation of security startups, including [[Qualys]], [[Sygate]], [[iRobot]], [[Arxan Technologies]], [[HyTrust]], and [[List of acquisitions by Cisco Systems|Neohapsis]].<ref>{{cite web|title=Rebecca Bace|url=https://www.oreilly.com/people/716f8-rebecca-bace|website=O'Reilly Media|access-date=18 April 2017|language=en}}</ref>


==Legacy==
==Legacy==
Multiple awards have been established in Bace's memory including the Rebecca Bace Pioneer Award for Defensive Security and the Rebecca Gurley Bace SWSIS Scholarship.<ref>{{Cite web|last=Allen|first=Allison Miller, Courtney|date=2017-08-17|title=Announcing the Rebecca Bace Pioneer Award for Defensive Security|url=https://www.oreilly.com/content/announcing-the-rebecca-bace-pioneer-award-for-defensive-security/|access-date=2022-01-21|website=O’Reilly Media|language=en-US}}</ref><ref>{{Cite web|title=SWSIS - CRA-WP|url=https://cra.org/cra-wp/scholarships-and-awards/scholarships/swsis/|access-date=2022-01-21|language=en-US}}</ref>
Multiple awards have been established in Bace's memory including the Rebecca Bace Pioneer Award for Defensive Security and the Rebecca Gurley Bace SWSIS Scholarship.<ref>{{Cite web|last=Allen|first=Allison Miller, Courtney|date=2017-08-17|title=Announcing the Rebecca Bace Pioneer Award for Defensive Security|url=https://www.oreilly.com/content/announcing-the-rebecca-bace-pioneer-award-for-defensive-security/|access-date=2022-01-21|website=O'Reilly Media|language=en-US}}</ref><ref>{{Cite web|title=SWSIS - CRA-WP|url=https://cra.org/cra-wp/scholarships-and-awards/scholarships/swsis/|access-date=2022-01-21|language=en-US}}</ref>


==Books==
==Books==
*{{cite book|last1=Bace|first1=Rebecca Gurley|title=Intrusion Detection|date=2000|publisher=Macmillan Technical|location=Indianapolis, IN|isbn=1578701856|url-access=registration|url=https://archive.org/details/intrusiondetecti00rebe}}
*{{cite book|last1=Bace|first1=Rebecca Gurley|title=Intrusion Detection|date=2000|publisher=Macmillan Technical|location=Indianapolis, IN|isbn={{Format ISBN|1578701856}}|url-access=registration|url=https://archive.org/details/intrusiondetecti00rebe}}
*{{cite book|last1=Smith|first1=Fred Chris|last2=Bace|first2=Rebecca Gurley|title=A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony as an Expert Technical Witness|date=2003|publisher=Addison-Wesley|location=Boston, MA|isbn=0201752794}}
*{{cite book|last1=Smith|first1=Fred Chris|last2=Bace|first2=Rebecca Gurley|title=A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony as an Expert Technical Witness|date=2003|publisher=Addison-Wesley|location=Boston, MA|isbn={{Format ISBN|0201752794}}}}


==References==
==References==

Revision as of 18:17, 24 July 2023

Becky Bace
Born
Rebecca Gurley Bace

(1955-08-07)August 7, 1955
Leeds, Alabama, United States
DiedMarch 14, 2017(2017-03-14) (aged 61)
Birmingham, Alabama, United States
NationalityAmerican
Alma materLoyola University Maryland
Employer(s)National Security Agency
Los Alamos National Laboratory
Infidel, Inc.
In-Q-Tel
University of South Alabama
Known forIntrusion detection system
"Den mother of computer security"
SpousePaul Bace
Children1 (deceased)
AwardsNSA Distinguished Leadership Award

Rebecca "Becky" Gurley Bace (1955–2017) was an American computer security expert and pioneer in intrusion detection. She spent 12 years at the US National Security Agency where she created the Computer Misuse and Anomaly Detection (CMAD) research program. She was known as the "den mother of computer security".[1] She was also influential in the early stages of intelligence community venture capital and was a major player in Silicon Valley investments in cyber security technology.[2]

Early life and education

Bace grew up in rural Alabama as one of seven children and was diagnosed with epilepsy in adolescence. Her mother was a war bride from Japan following World War II and her father was a self-educated teamster from Alabama.[3] Due to prevailing attitudes about the illness and about women, her neurologist suggested that she stay home and collect disability following high school.[4] She credited a local librarian and family friend, Bertha Nel Allen, for the encouragement to apply for college and scholarships. She won scholarships from charitable foundations set up by Betty Crocker and Jimmy Hoffa in her senior year of high school, and in 1973 she was accepted to the University of Alabama at Birmingham as the only woman in engineering.[3] Because of financial hardship and frequent employment interruptions, she took eight years of classes at various schools to earn her degree.[5] Bace first became interested in computing during her freshman year working with punch cards programming Fortran and COBOL on an IBM mainframe and got her first engineering job while teaching at an engineering lab. She was approached by a couple of Xerox technicians who needed to fill affirmative action requirements, and accepted a job as a specialist repairing copier machines.[3] Of the experience she stated that she faced significant gender and racial bias, and that "sometimes customers would raise a ruckus for having to deal with [her] because they believed they had been given "second best" when [she] showed up, even though [she] was better educated than most of the men."[3]

Career

After graduation in 1984, Bace started working at the NSA, and while searching for a flexible job to allow her to care for her autistic son who was later diagnosed with leukemia, she took an assignment in 1989 in the National Computer Security Center.[4] The NCSC was chartered as part of the NSA expressly to deal with computer security issues for the Department of Defense and the intelligence community. Bace served as program manager for intrusion detection research, specifically on transferring research into the relatively new commercial security products market.[6] She played a pivotal role in the apprehension of Kevin Mitnick, proving that trace back and capture were possible beyond the theoretical context.[5] She also provided some of the seed funding for computer security labs at UC Davis and Purdue University.[1]

Following the death of her son, Bace went to serve as the deputy security officer at Los Alamos National Laboratory in the Computing, Information and Communications Division.[7] She left Los Alamos in 1998 and started Infidel, Inc., a security consulting company.[3] In 2002, she signed on as a venture capital consultant at Trident Capital in Silicon Valley. Bace also briefly served as Technical VP of the Cyber Security Practice for In-Q-Tel, the investment arm of the US Intelligence Community, and before her death she served as chief strategist for the Center for Forensics, Information Technology, and Security (CFITS) at the University of South Alabama.[8] As a venture capitalist, she provided expert advice to a generation of security startups, including Qualys, Sygate, iRobot, Arxan Technologies, HyTrust, and Neohapsis.[9]

Legacy

Multiple awards have been established in Bace's memory including the Rebecca Bace Pioneer Award for Defensive Security and the Rebecca Gurley Bace SWSIS Scholarship.[10][11]

Books

  • Bace, Rebecca Gurley (2000). Intrusion Detection. Indianapolis, IN: Macmillan Technical. ISBN 1-57870-185-6.
  • Smith, Fred Chris; Bace, Rebecca Gurley (2003). A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony as an Expert Technical Witness. Boston, MA: Addison-Wesley. ISBN 0-201-75279-4.

References

  1. ^ a b Saita, Anne (September 2003). "Rebecca 'Becky' Base: From government to guiding security startups". SearchSecurity. TechTarget. Retrieved 18 April 2017.
  2. ^ Morgan, Steve (21 March 2017). "Goodbye Mama Bear, the cybersecurity community will miss you". Cybersecurity Business Report. CSO Online. Retrieved 18 April 2017.
  3. ^ a b c d e Thieme, Richard (1 April 2002). "IDS Den Mother: An Interview with Becky Bace — Thiemeworks". www.thiemeworks.com. Retrieved 18 April 2017.
  4. ^ a b Heiser, Deborah (16 April 2017). "Remembering Becky Bace". I.M.AGE Institute. Retrieved 18 April 2017.
  5. ^ a b McGraw, Gary (May 2007). "Silver Bullet Talks with Becky Bace" (PDF). IEEE Security & Privacy Magazine. 5 (3): 6–9. doi:10.1109/MSP.2007.70. Retrieved 18 April 2017.
  6. ^ Romeo, Jim (4 August 2014). "2014 Women in IT Security: Becky Bace". SC Magazine US. Retrieved 18 April 2017.
  7. ^ Yost, Jeffrey (31 July 2012). "Oral history interview with Rebecca G. Bace". University of Minnesota. hdl:11299/144022.
  8. ^ "Becky Bace, President/CEO, Infidel, Inc.; Chief Strategist for the Center for Forensics, Information Technology, and Security (CFITS) at the University of South Alabama". Women in Security and Privacy. 28 December 2016. Retrieved 18 April 2017.
  9. ^ "Rebecca Bace". O'Reilly Media. Retrieved 18 April 2017.
  10. ^ Allen, Allison Miller, Courtney (2017-08-17). "Announcing the Rebecca Bace Pioneer Award for Defensive Security". O'Reilly Media. Retrieved 2022-01-21.{{cite web}}: CS1 maint: multiple names: authors list (link)
  11. ^ "SWSIS - CRA-WP". Retrieved 2022-01-21.

External references