请输入您要查询的百科知识:

 

词条 Jason Healey
释义

  1. History

  2. Work in cyber policy

  3. Publications

  4. References

  5. External links

{{Infobox writer
| name = Jason Healey
| honorific_prefix =
| honorific_suffix =
| image =
| image_size = 250px
| alt =
| caption = Jason Healey speaking at the Security & Defence Agenda in 2011.
| native_name =
| native_name_lang =
| pseudonym =
| birth_name = Jason Healey
| birth_date =
| birth_place = Rhode Island
| death_date =
| death_place =
| resting_place =
| occupation = Director of Cyber Statecraft Initiative, Atlantic Council
| language =
| nationality =
| ethnicity =
| citizenship = United States
| education = {{unbulleted list|M.S. in Information Security, James Madison University}}
| alma_mater =
| period =
| genre =
| subject = cyber security, cyber policy
| movement =
| notableworks = A Fierce Domain, Cyber Conflict 1986 to 2012
| spouse =
| partner =
| children =
| relatives =
| awards =
| signature =
| signature_alt =
| module =
| website = {{URL|https://twitter.com/Jason_Healey}}
}}

Jason Healey is a director at the Atlantic Council in charge of the Cyber Statecraft Initiative. He has published several academic articles, essays, and books on the topic of cyber security and has advised on security measures for corporate, government, and military institutions. He has been identified as the first historian of cyber conflict.

History

Healy was born and raised in Rhode Island, and at 17, joined the United States Air Force.[1] Initially training to be a fighter pilot, Healey transitioned to signals intelligence and in 1998, began working at The Pentagon to implement a computer network defense system.[1] During his Air Force career, Jason was awarded two Meritorious Service Medals based on his contributions in cyber security during his service at the Pentagon.[2] Healey later received a master's degree in Information Security from James Madison University.[1][2]

Work in cyber policy

Healey has worked in numerous settings with regard to cyber policy, its implementation, and addressing responses to security threats. In Hong Kong, he served as the vice president for Goldman Sachs where he developed a crisis-response system built to address incidents across the Asian continent. He has also worked at The White House as the Director for Cyber Infrastructure Protection. He is currently a board member on the Cyber Conflict Studies Association and the Military Cyber Professionals Association.[2] The extent of his work has led one magazine to refer to Healey as the first historian of cyber conflict.[1]

Frequently, Healey has publicly commented[3][4] and written articles[5][6] on high-profile malware threats and cyber policy. For instance, Healey has discussed the potential advantages and disadvantages of the United States launching cyber-based attacks.[7] In regards to such an offensive on Syria, he stated that "you no longer have to drop physical bombs and kill people, that it can be targeted, non-lethal microforce", but further surmised that due to past leaks of the United States' involvement in Stuxnet, relevant government agencies may have decided against it.[8] Healey has also commented on the Heartbleed bug, noting the failure of the NSA to live up to its stated priority of defense by not exposing the bug when it was found, and he said that the organization would be "shredded by the computer security community" for this failure.[9] In 2013, Healey also took a critical stance on the current state of mass surveillance in the United States. He predicted that U.S. interests abroad would suffer "deep and long term damage" given that the administration could not implement any alternatives to spying conducted by the National Security Agency.[10]

In 2012, Healey published A Fierce Domain, Cyber Conflict 1986 to 2012, which explores the idea that confrontations that have taken place within cyberspace has established a new kind of conflict. This development is explored historically, starting in 1986 with a hacking initiative planned by the KGB to steal military plans from the U.S. in what is referred to as the Cuckoo's Egg Case.[1][11] The book received a positive reception[12] and has been referred to as a definitive historical record of cyber conflict.[13]

In March 2014, Forbes Magazine identified Healey as one of twenty cyber policy experts to follow on Twitter.[14]

Publications

  • Cyber Security Policy Guidebook (2012), co-author, published by John Wiley & Sons ({{ISBN|9781118241325}})
  • A Fierce Domain, Cyber Conflict 1986 to 2012 (2013), author, published by the Cyber Conflict Studies Association ({{ISBN|9780989327404}})

References

1. ^{{cite web|last=Vitaliev|first=Vitali|title=Interview with Jason Healey|url=http://eandt.theiet.org/magazine/2013/12/interview-jason-healy.cfm|work=E&T Magazine|publisher=The Institution of Engineering and Technology|accessdate=12 April 2014}}
2. ^{{cite web|author=David Balaban |url=http://privacy-pc.com/interviews/why-is-cyber-conflicts-amnesia-dangerous-interview-with-jason-healey-from-the-atlantic-council.html |title=Why is Cyber Conflicts Amnesia Dangerous? Interview with Jason Healey from the Atlantic Council |publisher=Privacy PC |date=2013-06-03 |accessdate=2014-04-14}}
3. ^{{cite web|last=Mullen |first=Shannon |url=http://www.marketplace.org/topics/tech/tech-companies-look-stay-ahead-hackers |title=Tech companies look to stay ahead of hackers |publisher=Marketplace.org |date=2013-07-09 |accessdate=2014-04-14}}
4. ^{{cite web|author=Karen Epper Hoffman |url=http://www.scmagazine.com/advanced-malware-the-growing-cyber-menace/article/329701/ |title=Advanced malware: The growing cyber menace |work=SC Magazine |date=2014-02-03 |accessdate=2014-04-14}}
5. ^{{cite journal|last=Healey|first=Jason|title=The Spectrum of National Responsibility for Cyberattacks|journal=Brown Journal of World Affairs|year=2011|volume=18|issue=1|pages=57–69}}
6. ^{{cite journal|last=Healey|first=Jason|title=Four ways to address cyberconflict – and how analytics can help|journal=Journal of Advanced Analytics|date=Q4, 2011|pages=32–34|url=http://www.sas.com/news/intelligence_quarterly/q411.pdf|accessdate=14 April 2014}}
7. ^{{cite web|last=Gjelten|first=Tom|title=Pentagon Goes On The Offensive Against Cyberattacks|url=https://www.npr.org/2013/02/11/171677247/pentagon-goes-on-the-offensive-against-cyber-attacks|work=Morning Edition|publisher=NPR|accessdate=15 April 2014}}
8. ^{{cite news|last=Todd|first=Brian|title=Syria: U.S. Cyber-Strike|url=http://www.cnn.com/video/?/video/bestoftv/2014/02/28/exp-tsr-todd-syria-us-cyber-strike.cnn&iref=allsearch&video_referrer=http%3A%2F%2Fwww.cnn.com%2Fsearch%2F%3Fquery%3DCyber%2BStrike%2Bon%2BSyria%26x%3D0%26y%3D0%26primaryType%3Dmixed%26sortBy%3Drelevance%26intl%3Dfalse|work=The Situation Room|publisher=CNN|accessdate=14 April 2014}}
9. ^{{cite news|title=NSA said to have exploited Heartbleed bug, exposing consumers|url=http://www.nydailynews.com/news/national/nsa-knew-heartbleed-web-flaw-article-1.1754163|accessdate=14 April 2014|newspaper=NY Daily News|date=12 April 2014|author=Bloomberg News}}
10. ^{{cite news|title=Lawmakers Spurn Obama Bid to Preserve NSA Data Gathering|url=https://www.bloomberg.com/news/2013-11-06/lawmakers-spurn-obama-bid-to-preserve-nsa-data-gathering.html|accessdate=14 April 2014|newspaper=Bloomberg News|date=5 November 2013|author=Strohm, Chris|author2=Gaouette, Nicole}}
11. ^{{cite web|title=Jason Healey: A Fierce Domain|url=http://www.pritzkermilitary.org/whats_on/pritzker-military-presents/jason-healey-fierce-domain/|work=Pritzker Military Presents|publisher=Pritzker Military Museum & Library|accessdate=15 April 2014}}
12. ^{{cite web|title=Digital doomsters|url=https://www.economist.com/news/books-and-arts/21580123-how-scared-should-we-be-digital-doomsters|work=The Economist|publisher=The Economist Newspaper Limited|accessdate=16 April 2014|date=29 June 2013}}
13. ^{{cite web|last=Gourely|first=Bob|title=A Fierce Domain: Conflict in Cyberspace, 1986 to 2012|url=http://www.ctovision.com/2013/06/a-fierce-domain-conflict-in-cyberspace-1986-to-2012/|work=CTOvision.com|accessdate=16 April 2014}}
14. ^{{cite web|url=https://www.forbes.com/sites/richardstiennon/2014/04/07/20-cyber-policy-experts-to-follow-on-twitter/ |title=20 Cyber Policy Experts To Follow On Twitter |publisher=Forbes |date=2014-03-26 |accessdate=2014-04-14}}

External links

  • {{Twitter}}
  • Jason Healey On a Fierce Domain at the Pritzker Military Museum & Library recorded on April 10, 2014
  • The Next Battlefield: On Cyber War at the Pritzker Military Museum & Library recorded on September 26, 2014
  • {{C-SPAN|Jason Healey}}
{{Authority control}}{{DEFAULTSORT:Healey, Jason}}

9 : Living people|Year of birth missing (living people)|People from Rhode Island|James Madison University alumni|Writers about computer security|Internet security|United States Air Force personnel|Goldman Sachs people|Place of birth missing (living people)

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/27 5:55:42