EditWYSIWYGAttach PDF Raw View►More Actions▼More Actions


Restore topic to revision: You will be able to review the topic before saving it to a new revision

Copy text and form data to a new topic (no attachments will be copied though).
Name of copy:
You will be able to review the copied topic before saving

Rename/move topic... scans links in all public webs (recommended)
Rename/move topic... scans links in CBI_ComputerSecurity web only
Delete topic... scans links in all public webs (recommended)
Delete topic... scans links in CBI_ComputerSecurity web only

Revision Date Username Comment
1719 Mar 2015 - 17:40ThomasMisa 
1619 Mar 2015 - 17:39ThomasMisa 
1519 Mar 2015 - 17:39ThomasMisa 
1419 Mar 2015 - 17:36ThomasMisa 
1319 Mar 2015 - 12:49halky001? 
1211 Mar 2015 - 18:50ThomasMisa 
1111 Mar 2015 - 18:46ThomasMisa 
1005 Mar 2015 - 15:38halky001? 
905 Mar 2015 - 15:37halky001? 
805 Mar 2015 - 10:28halky001? 
earlier first

Render style:     Context:


 History: r17 | r13 < r12 < r11 < r10
[X] Hide this message.
Notice: On June 30, 2016, UMWiki service will be decommissioned. If you have information in UMWIki that needs to be preserved, you should make plans to move it before that date. Google Sites is anticipated to be the most popular and appropriate alternative for users because it offers a more modern and user-friendly interface and unlimited capacity. To learn more about the features of Google Sites and other alternatives, and to identify which one best fits your needs, see the University’s Website Solution Selection Guide. If you have concerns or would like help regarding this change and your options, please contact Technology Help at help@umn.edu
You are here: UMWiki>CBI_ComputerSecurity Web>ToDoList>PeopleMurrayWilliamH (revision 11)

Current Activitieslock Who is Who?lock People Programs Publications CSHW_2014 Systems Events Mechanisms

William Hugh Murray

(work in progress -- RAH)

William Hugh Murray is a management consultant, information security professional and former chairperson of the International Information Systems Security Certification Consortium (ISC2).

Murray graduated from the Louisiana State University in 1962 with a degree in Business Administration. Having worked for IBM prior to graduation, teaching programming on IBM 650, 1401 and 705 systems, he went on to work at IBM’s Advanced Product Planning group as a project manager on IBM’s AAS (Advanced Administrative System) project, which exposed him to the nascent computer security field. His work on access control mechanisms within AAS was highly influential, pioneering the concepts of list-based access control and user authentication.(1)

In 1975, having moved on to IBM’s marketing division, Murray was involved in promotion of the DES encryption standard, a result of his experience in AAS. His role was in producing marketing materials from the sparse and highly technical information available at the time. Similarly, Murray’s 1976 publication, Data Security Controls and Procedures brought the more general topic of data security to a wider audience.(2) Replacing an earlier internal document that had been superseded by changing technologies, it was specifically written to be technology-neutral, and remained a part of the computer security body of knowledge into the early 1990s.(3)

Murray's 1984 paper, "Security Considerations for Personal Computers" was an early acknowledgement that personal computers required an entirely different security approach than mainframe systems, addressing the issues surrounding data, application, and communication security in an environment where physical security of machine and data was no longer guaranteed.(4)

After retiring from IBM in the mid-1980s, Murray worked as a consultant for Ernst & Young and, later, Deloitte & Touche. During this time, security experts were defining their profession through a common body of knowledge -- and a certification program. Murray was involved in both efforts. He served on the ISSA committee that established the common body of knowledge in 1990, and helped develop the Certified Information Systems Security Professional (CISSP) qualification. Its overseeing body, the International Information Systems Security Certification Consortium (ISC2) today serves as the "gold standard" qualification for information security professionals.(5) (6)

 
Supported by the National Science Foundation CNS--TC 1116862 "Building an Infrastructure for Computer Security History."

Notes

1 , 3 , 5 : Oral History Interview with William Hugh Murray, conducted by Jeff Yost.

2 : This publication is available on DropBox via http://tinyurl.com/ld942lg (accessed March 2015)

4 : W. H. Murray, "Security considerations for personal computers," IBM System Journal 23, 3 (September 1984), 297-304. DOI=10.1147/sj.233.0297 http://dx.doi.org/10.1147/sj.233.0297

6 : ISC2 website: About Us https://www.isc2.org/aboutus/default.aspx


Edit | WYSIWYG | Attach |  PDF |  History: r17 | r13 < r12 < r11 < r10 |  Backlinks |  Raw View | More topic actions...
Topic revision: r11 - 11 Mar 2015 - 18:46:09 - ThomasMisa
 
Signed in as lewi0740 (NicLewis) | Sign out
UMWiki UMWiki
This site is powered by FoswikiCopyright © by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding UMWiki? Send feedback