Justin Pelletier Headshot

Justin Pelletier

Director of the GCI Cyber Range and Training Center
Department of Computing Security
Golisano College of Computing and Information Sciences
Lecturer

585-475-2533
Office Location
Office Mailing Address
152 Lomb Memorial Drive Rochester, NY 14623

Justin Pelletier

Director of the GCI Cyber Range and Training Center
Department of Computing Security
Golisano College of Computing and Information Sciences
Lecturer

Education

BS, Stonehill College; MBA, Rochester Institute of Technology; Ph.D., Capella University

Bio

Justin Pelletier, of the Computing Security Department at Rochester Institute of Technology (RIT), is the business director for Eaton Cybersecurity Security Assessment and Forensics Examination (SAFE) Lab in RIT's Center for Cybersecurity. He is also the national director of the Collegiate Penetration Testing Competition. He holds a PhD in Information Assurance and Security, an MBA in Entrepreneurship, and a BS in Computer Science. Dr. Pelletier has taught at the undergraduate and graduate levels and helped to bring the Hacking for Defense initiative to RIT.

He is counterintelligence officer in the army reserve and holds a top-secret clearance. Prior to joining academia, Dr. Pelletier was a GS14 civilian intelligence officer for Defense Intelligence Agency, where he led Europe/Eurasia cyber threat analysis. He is a former member of the National Security Council's Information Systems Working Group for modeling and simulation. His current research interests include the economics of information security, security in distributed systems, and ethics in intelligent combat systems. 

585-475-2533

Currently Teaching

CSEC-759
3 Credits
This course explores current topics in Computing Security. It is intended as a place holder course for faculty to experiment new course offerings in Computing Security undergraduate program. Course specific details change with respect to each specific focal area proposed by faculty.
CSEC-472
3 Credits
As more users access remote systems, the job of identifying and authenticating those users at distance becomes increasingly difficult. The growing impact of attackers on identification and authentication systems puts additional strain on our ability to ensure that only authorized users obtain access to controlled or critical resources. This course reviews basic cryptology techniques and introduces their application to contemporary authentication methods.
MGIS-489
3 Credits
Advanced study of MIS topics reflecting contemporary issues and/or current technological advancements impacting the development, implementation and management of information systems in organizations. Seminar topics have ranged from new technological developments to management security issues in MIS systems. Topics for a specific semester will be announced prior to the course offering.
CSEC-604
3 Credits
In this course, students will learn in depth knowledge of cryptography and authentication. Students will explore various cryptography algorithms, authentication protocols, and their design and implementation. Students will work on a project to implement a cryptographic algorithm and/or an authentication protocol. The applications of cryptography and authentications in the areas of computer networks and systems and information assurance will also be investigated.
CSEC-799
1 - 3 Credits
A student works with a faculty member to devise a plan of study on a topic in various areas of computing security. Deliverables, evaluation methods, and number of credits need to be specified in a written proposal. A final report and presentation in the form of a poster session is expected and graded at the end of the term.
CMPE-489
3 Credits
Topics and subject areas that are not among the courses listed here are frequently offered under the special topics title. Under the same title also may be found experimental courses that may be offered for the first time. Such courses are offered in a formal format; that is, regularly scheduled class sessions with an instructor. The level of complexity is commensurate with a senior-level undergraduate technical course.
CSEC-742
3 Credits
The importance of effective security policies and procedures coupled with experience and practice is emphasized and reinforced through research and practical assignments. Organization and management of security discipline and response to threats is studied. Case studies of effective and failed security planning and implementation will be examined and analyzed. The issues influencing proper and appropriate planning for security and response to attacks will be studied. To be successful in this course students should be knowledgeable in networking, systems, and security technologies.
CSEC-599
1 - 6 Credits
Students will work with a supervising faculty member on a project of mutual interest. Project design and evaluation will be determined through discussion with the supervising faculty member and documented through completion of an independent study form to be filed with the department of computing security.

Select Scholarship

Journal Paper
Pelletier, J.M. "Longitudinal Analysis of Information Security Incident Spillover Effects." Journal of Management Science and Business Intelligence 3. (2018): 15-20. Web.
Peer Reviewed/Juried Poster Presentation
Pelletier, J.M. "The Race to Feld and Secure Autonomous Combat Units." Proceedings of the 2018 USENIX Summit on Hot Topics in Security, Baltimore, MD. Ed. David Brumley, Parisa Tabriz. Baltimore, MD: n.p..
Published Conference Proceedings
Pelletier, J.M. and Shita, M. "Optimizing Alternative Futures: Assuring Security in the Event of Machine Superintelligence." Proceedings of the Proceedings of the International Conference on Intelligent Computing and Big Data, Houston, TX, 6-7 April, 2018. Ed. Bruce O'Neal, Yu Sun. Houston, TX: IBII, Print.
Hair, N., Santa, J., and Pelletier, J.M. "Loring Online Students’ Perceptions of Website Customer Experience." Proceedings of the OLC Accelerate 2018. Orlando, FL. Ed. Katie Fife Schuster. Orlando, Florida: OLC, 2018. Print.