| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

William Hugh Murray - (Murray, William H)

Page history last edited by Jack Daniel 7 years, 4 months ago

Murray's "Thinking About Security" blog: http://whmurray.blogspot.com/
Presentation: William H. Murray, Everything I Needed to Know About Network Security... (July 20, 2000) on YouTube: http://www.youtube.com/watch?v=ypg5r3-p0JM
Oral history at the Babbage Institute: http://conservancy.umn.edu/handle/11299/163163

 

From the retired wiki at the University of Minnesota's Babbage Institute:

"William Hugh Murray is a management consultant, information security professional and former chairperson of the International Information Systems Security Certification Consortium (ISC2).

Murray graduated from the Louisiana State University in 1962 with a degree in Business Administration. Having worked for IBM prior to graduation, teaching programming on IBM 650, 1401 and 705 systems, he went on to work at IBM?s Advanced Product Planning group as a project manager on IBM?s AAS (Advanced Administrative System) project. AAS exposed him to the nascent computer security field. His work on access control mechanisms within AAS was highly influential, pioneering the concepts of list-based access control and user authentication.(1)

"In 1975, having moved on to IBM?s marketing division, Murray was involved in promotion of the DES encryption standard, a result of his experience in AAS. His role was in producing marketing materials from the sparse and highly technical information available at the time. Similarly, Murray?s 1976 publication, Data Security Controls and Procedures brought the more general topic of data security to a wider audience.(2) Replacing an earlier internal document that had been superseded by changing technologies, it was specifically written to be technology-neutral, and remained a part of the computer security body of knowledge into the early 1990s.(3)

"Murray's 1984 paper, "Security Considerations for Personal Computers" was an early acknowledgement that personal computers required an entirely different security approach than mainframe systems, addressing the issues surrounding data, application, and communication security in an environment where physical security of machine and data was no longer guaranteed.(4)

"After retiring from IBM in the mid-1980s, Murray worked as a consultant for Ernst & Young and, later, Deloitte & Touche. During this time, security experts were defining their profession through a common body of knowledge -- and a certification program. Murray was involved in both efforts. He served on the ISSA committee that established the common body of knowledge in 1990, and helped develop the Certified Information Systems Security Professional (CISSP) qualification. Its overseeing body, the International Information Systems Security Certification Consortium (ISC2) today creates the "gold standard" for information security professionals."

 

Inducted into the (US) National Cyber Security Hall of Fame 2016 http://www.cybersecurityhalloffame.com/

From the Cyber Security Hall of Fame page:

Pioneer, author, a founder of Colloquium for Information System Security Education (CISSE)

"William Hugh Murray began his security career at IBM in the late 1960s when he managed the development of the user access control subsystems for IBM’s ground breaking Advanced Administrative System (AAS), a model for later systems. In 1976 he authored the IBM publication Data Security Controls and Procedures which remained in publication into the 90s. These two works began a career providing security leadership, innovation, guidance, and support to government, business, and academia and their requirements to IBM research and product development. 

"He is a founder of the Colloquium for Information System Security Education (CISSE). He led the ISSA committee that expressed the professional common body of knowledge which was used to develop the examination for certifying information security professionals and the (ISC)2 committee that wrote the professional code of conduct and ethical guidance. He served for more than a decade on the Board of (ISC)2 seeing it from a volunteer effort to a self-supporting enterprise serving more than a hundred thousand professionals."

 

Comments (0)

You don't have permission to comment on this page.