Jump to content

Chuck Easttom

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 51.211.175.29 (talk) at 13:52, 11 November 2018. The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

  • Comment: This appears to be a promotional autobiography. Wikipedia is not a resume hosting service. Please review WP:COI. K.e.coffman (talk) 03:12, 22 October 2018 (UTC)

William Chuck Easttom II is a computer security consultant, author, inventor, and educator.[1]. He has been named a Distinguished Speaker of the ACM, [2] He has authored 26 books on computer security, programming languages, linux, cyber forensics, penetration testing, and cryptography and he frequently is featured as a guest speaker at forensic conferences, such as the AAFS conference 2017, IAFLS Conference 2017 in Cairo, Secure Jordan 2016 and 2017, ADFSL Conference 2016, and ISC2 Security Congress 2014, 2015, and 2017.

He provides digital forensics training to state, local, and federal law enforcement. His computer security and forensics courses are approved by the U.S. Department of Homeland Security - National Initiative For Cyber Security Careers and Studies (NICCS).

He created the OSFCE (OSForensics Certified Examiner) course and test, the EC Council Certified Encryption Specialist course and certification test, and EC Council CAST Advanced Encryption course.

He is a frequent speaker at forensic conferences including: AAFS conference 2017, IAFLS Conference 2017 in Cairo, Secure Jordan 2016 and 2017, ADFSL Conference 2016, and ISC2 Security Congress 2014, 2015, and 2017.

Education

He holds a B.A. in Communications from Southeastern Oklahoma State University, a M.Ed. from Southeastern Oklahoma State University, a masters degree in Applied Computer Science from Northcentral University,as well as a Doctor of Science in cyber security from Capitol Technology University and he is currently pursuing a third masters degree from the University of Texas at El Paso.

List of Books

Chuck Easttom is the author of 26 computer science books. These include:

  • Essential Linux Administration: A Comprehensive Guide for Beginners. Cengage Press (2011)
  • System Forensics, Investigation, and Response. Jones & Bartlett (2013)
  • Certified Cyber Forensics Professional All in One Guide. McGraw-Hill (2014)
  • Computer Security Fundamentals (3rd Edition). Pearson IT Cybersecurity Curriculum (ITCC)) (2016)
  • System Forensics, Investigation, and Response (Information Systems Security & Assurance) 3rd Edition. Jones and Bartlett (2017)
  • CompTIA Security+ Study Guide: Exam SY0-501. John Wiley & Sons (2017)
  • Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits (1st Edition). Pearson IT Cybersecurity Curriculum (2018)
  • CompTIA Security+ Practice Tests: Exam SY0-501. Sybex (2018)
  • Network Defense and Countermeasures: Principles and Practices (3rd Edition). Pearson IT Cybersecurity Curriculum (ITCC)) (2018)

Easttom, C. (2014). Windows Registry Forensics. Research Gate.[3]

Easttom, C. (2018, May). An Examination of Inefficiencies in Key Dependent Variations of the Rijndael S-Box. In Electrical Engineering (ICEE), Iranian Conference on (pp. 1658-1663). IEEE.

Easttom, C. (2018). A Generalized Methodology for Designing Non-Linear Elements in Symmetric Cryptographic Primitives. In Computing and Communication Workshop and Conference (CCWC), 2018 IEEE 8th Annual. IEEE.[4]

Easttom, C. (2018) An Overview of Cryptographic Backdoors. Journal of Information System Security, 13 (3), 177-185.

Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examination. International Journal of Innovative Research in Information Security (IJIRIS), 4(2)[5]

Easttom, C. (2017). A Model for Penetration Testing. Research Gate. DOIRG.2.2.36221.15844[6]

Easttom, C. (2017).  The RSA Algorithm Explored. International Journal of Innovative Research in Information Security. (IJIRIS). 4(1)[7]

Presentation on "Quantum Computing and Lattice Based Cryptography" April 11, 2018 University of Texas at Dallas ACM chapter as part of the Distinguished Speakers of the ACM program.

Easttom, C. (2018). How to model digital forensics investigations with graph theory. Digital Forensics Magazine, 37.

Easttom, C. (2018). "A Systems Approach To Indicators Of Compromise Utilizing Graph Theory". 2018 IEEE International Symposium on Technologies for Homeland Security.


Patents

Method and apparatus of performing distributed steganography of a data message. U.S. Patent 8,527,779[8]

Method and apparatus of performing data executable integrity verification. U.S. Patent No. 8,984,639[9]

Method and apparatus of performing data executable integrity verification (a continuation patent of '639). U.S. Patent No. 9,405,907[10]

Method and apparatus providing a multiple source evidence application trust model. US Patent 9,984,229[11]

Stable File System. U.S. Patent No. 8,713,067[12]

Method and apparatus of performing data executable integrity verification. U.S. Patent No. US 8,819,827 B1[13]

Managing a network element operating on a network. US Patent No.8,825,845 B1[14]

Domain name service based remote programming objects. US Patent No.8,825,810 B1[15]

Domain name service based remote programming objects. US Patent No.9,313,167 B1[16]

US Patent No. 9,619,656 Method and apparatus of performing distributed steganography of a data message (continuation patent of 8,527,779 B1)

US Patent No. 9,686,227 Domain Name Service based remote programming objects. A continuation patent of U.S. Pat. No. 9,313,167

US Patent No. 9,755,887 Managing a network element operating on a network

US Patent No. 9,754,108 Method and apparatus of performing data executable integrity verification

US Patent No. 9,753,957 System and method for document tracking

References

  1. ^ "Chuck Easttom's website". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  2. ^ "ACM Distinguised Speaker". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  3. ^ "Windows Registry Forensics". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  4. ^ "A Generalized Methodology for Designing Non-Linear Elements in Symmetric Cryptographic Primitives". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  5. ^ "Utilizing Graph Theory to Model Forensic Examinations" (PDF). {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  6. ^ "A Model for Penetration Testing". {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  7. ^ "The RSA Algorithm Explored" (PDF). {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  8. ^ US 8527779B1, "Method and apparatus of performing distributed steganography of a data message", issued 2011-08-31 
  9. ^ US 8984639B1, "Method and apparatus of performing data executable integrity verification", issued 2014-08-13 
  10. ^ US 9405907B1, "Method and apparatus of performing data executable integrity verification", issued 2015-03-16 
  11. ^ US 9984229, Easttom, I. I., "Method and apparatus providing a multiple source evidence application trust model", issued May 29, 2018 
  12. ^ US 8713067B1, "Stable file system", issued 2011-07-08 
  13. ^ US 8819827B1, "Method and apparatus of performing data executable integrity verification", issued 2011-11-10 
  14. ^ US 8825845B1, "Managing a network element operating on a network", issued 2011-11-10 
  15. ^ US 8825810B1, "Domain name service based remote programming objects", issued 2011-07-11 
  16. ^ US 9313167B1, "Domain name service based remote programming objects", issued 2014-09-02