The first virus developed was purely an innocent mistake. But the cybersecurity has evolved rapidly because of impeccable increase in cybercrime field. In this article, you will read how it all started and continues to grow drastically. Also understand deep about Cyber Security History and how it all began with the growth of hackers.
In 1960 when organisations began to become extra guarding of their computers. There was no internet or network to concern about, so security only concentrated on physical factors and restricting access to people with ample information about the computer. Password and many layers of protection were added to the system. Fire safety measures were taken, to assure that the data stored in the system was protected.
The first computer virus developed was unintentional. In the year 1970 engineer Bob Thomas designed a code intending to move the programs between systems connected by ARPANET. The code has zero intention to cause any risk, displayed a humorous message, “I’m the Creeper: Catch me if you can!” In return, Bob friend Ray Tomlinson coded a higher version of the program that replicates multiple time itself on the computer system. This coding program called Reaper, which deletes the original program code of Bob Thomas and repeats itself on it. The conflict between the Creeper and Reaper was a notable moment in the cyber security history.
In 1980 computers viruses grew more superior and security systems were not capable enough to protect systems from new hacking strategies.
In 1986 German computer hacker Marcus Hess stole US military secrets. He hacked around 400 computers including mainframes at the Pentagon and proposed trading their codes to the KGB.
In 1988, Morris Worm has developed the notable turning points in the history of information security. Internet usage began to increase rapidly. Security policies become expensive which gave rise to the new virus. It was named after its inventor Robert Morris. The worm replicates itself across networks. It aimed to recognise lacking areas in a network interruption blocking system. The worm repeats itself so rapidly that damages the system and slows down the internet speed.
In 1990 More and more people began to know about the internet. They Started sharing up their personal data online. The attackers found an ideal source of raising funds and started stealing personal data of government officials and people using the internet. Network security threats increased rapidly. Firewall and anti-virus software were manufactured in bulk, the researchers build a virtual firewall which was formed on the physical body that protects the expansion of fires inside structures.
Antivirus programs were created to minimise the risk of attacks, computer viruses and worms became powerful and fast, so hackers had more advantage at the time.
In 2000, the government considered hacking as a crime and gave strict punishments to the culprits. It was the first time when punishment was decided for the hackers.
Information security proceeded to advance as the internet users and usage grew rapidly, so did viruses.
Hackers became more powerful to create harmful viruses that target whole cities, states even countries and continents.
Knowing the cyber security history gives you a summary of how cybersecurity has evolved from being a mere experiment.
Cyber-attacks are now continuing to emerge and become more intricate, the rapidly evolving cybersecurity industry faces compelling new hurdles and systems to combat the ever-present menace of malicious activity. A Powerful cybersecurity plan supports the business to meet its requirements based on the sectors and operations.
We need to apprehend these advance attacks by actively developing solutions against them.
So, have you made up your mind to make a career in Cyber Security? Visit our Master Certificate in Cyber Security (Red Team) for further help. It is the first program in offensive technologies in India and allows learners to practice in a real-time simulated ecosystem, that will give you an edge in this competitive world.
Fill in the details to know more
What Is Asset Classification?
March 20, 2023
Masquerade Attack – Everything You Need To Know!
February 27, 2023
Best Infosys Information Security Engineer Interview Questions and Answers
What Are SOC and NOC In Cyber Security? What’s the Difference?
A Brief Introduction to Cyber Security Analytics
February 26, 2023
Cyber Safe Behaviour In Banking Systems
February 17, 2023
Add your details:
By proceeding, you agree to our privacy policy and also agree to receive information from UNext through WhatsApp & other means of communication.
Upgrade your inbox with our curated newletters once every month. We appreciate your support and will make sure to keep your subscription worthwhile