michael reeves

CISSP C|EH CySA+ A+ Net+ Linux+

After a lifetime of interest in everything computer-related, earning a Master's degree in Information Assurance, a collection of professional certifications (to include the highly sought CISSP), and over 15 years professionally in the field, I am an expert in cyber security. Believing that any cyber security professional must be as diverse as the industry itself, I have explored virtually every aspect of the field including (but not limited to) networking and infrastructure, system design and maintenance, patch management, data mining and analytics, penetration testing, cryptography, risk management, SIEM integration, and incident response. I continuously keep abreast of the latest developments in the industry and look forward to the challenges of ever-advancing technology.

Areas of Exptertise

  • System Analysis and Design
  • Intrusion Detection
  • Vulnerability Assessment
  • Boundary Protection
  • Network Design and Administration
  • Network Media Termination
  • Enterprise Administration
  • Change Management
  • Disaster Recovery
  • Project Management
  • Big Data Analitics
  • Security Information and Event Management
  • Incident Response

Technologies Experience

  • Cisco Routers/Switches
  • Cabletron Routers/Switches
  • Unix/Linux Administration
  • Tenable Nessus (ACAS)
  • McAfee ePolicy Orchestrator (HBSS)
  • Splunk
  • IBM Q-Radar
  • McAfee Enterprise Security Manager
  • McAfee Enterprise Firewall
  • PaloAlto Next-Generation Firewall
  • BlueCoat Proxy Server
  • Core Impact
  • Kali/Backtrack/Metasploit
  • RedSeal

Michael's Published Works

IASL Volume 2

A Proposed Model for Vulnerability Analysis Using Critical Paths

Information Assurance and Security Letters

Determining the means by which an attacker may compromise a given system is the main purpose of vulnerability assessment. As such, there are several models currently in place to track vulnerabilities. Some models focus on the susceptibility of a computer system as a whole where other models track attack paths through a network. This paper proposes a model which accomplishes both. The primary focus of the model is to identify synergistic attacks--consisting of multiple exploits used in tandem; thereby, resulting in a greater threat than the individual exploits alone. By using this data, a critical path can be identified; thus, revealing the exploit combination posing the greatest risk. Applying the critical path in conjunction with attack origins expands the diagram to depict attack vectors. Exploding the diagram by applying the model to all systems on the network with attack vectors depicts the entire network as a whole. Information from the model can then be used to harden both systems and the network, maximizing the benefits of the added security measures

JIAS Volume 9 Issue 1

Port Knocking with Single Packet Authentication using Asymmetric Key Cryptography

Journal of Information Assurance and Security

Protecting services from attack is the sole purpose of a firewall; however, some services (generally those for remote administration) require enough leniencies in their rules that the protection of a firewall is quite limited. Port Knocking is a method which may helps protect against attack, by preventing firewall responses to connection requests until appropriate conditions are met, in the form of a knocking packet sequence. To harden the security of Port Knocking further, asymmetric cryptography can be used to reduce the number of knocking packets to a single packet while also authenticating the individual user.

Security vs. Convenience

Security vs. Convenience

Computer Security is Common Sense: Volume 1

The inter-workings of computer security is often viewed as mysterious; however, nothing could be further from the truth. Computer Security is Common Sense is a series of simple to follow books, each tackling a separate aspect of computer security. Through use of analogies, these books help associate computer security practices with real life, everyday examples without sacrificing the accuracy of the technical details. These books are perfect for non-technical managers, computer security novices, and system administrators looking to broaden their knowledge.

Conflicts of Interest

Conflicts of Interest

Computer Security is Common Sense: Volume 2

The second in the Computer Security is Common Sense series, Conflicts of Interest addresses the various roles of administrators and security personnel are placed in as well as how these roles may effect each other and the organization as a whole. This book attempts to shed light on the complex nature of proper checks-and-balances, several considerations to account for, and the reason to employ them in the first place.

The Path of Least Resistance

The Path of Least Resistance

Computer Security is Common Sense: Volume 3

The Path of Least Resistance, the third in the Computer security is Common Sense series, approaches network defense by addressing the methodology of attacking a network. Attackers plan their attacks to be swift and targeted, minimizing the chance of being caught. By identifying the weakest links and hardening them, the entire chain-mail of security is more resilient.

The Myth of the Secure OS

The Myth of the Secure OS

Computer Security is Common Sense: Volume 4

Every tool has its use and every operating system has its role. Selecting an operating system is a critical decision which can effect the capabilities and security posture of a network for years to come. The Myth of the Secure OS addresses the strengths and weaknesses of the major operating systems, aligning them with common capabilities or computing needs. The goal of this book is not to sway towards one OS or another, but to emphasize that each OS has its own Yin and its own Yang.