Interactive Powerpoint_How to Master effective communication
Information security fundamentals topic 2: Evolution of Information security
1. Information Security Fundamentals
Module1:Know the Basics about the Information Security:
Topic2: Evolution of Information Security
By,
Neha Raju K
Assistant Professor
BCA-Cloud Technology and Information Security Management
3. Security Layers
• Physical Security: To Protect physical items and
objects.
• Personnel Security: To protect from risk, individuals
or groups of individuals(staffs) who are authorised to
access the organisation and its operation.
• Operation Security: To protect the details of
particular operations.
• Networking Security: To protect networking
components and connections.
• Communication Security: To protect communication
Media.
• Information security: To Protect confidentiality,
integrity and availability of information during
storage, processing or transmission of information
assets.
4. Evolution of
Information Security
1960 s
• The number of attempts to breach computer
security was low due to the several reasons:
• computers were expensive, rare and closely
safeguarded,
• There were very few programming experts as the
discipline was new and computers were
programmed in difficult machine languages.
• High-priced machines.
• Larry Robert Developed a Project called
ARPANET to transfer information to different
computer centers.
5. 1970s and 1980s
• ARPANET became famous and widely used.
• Identified the primary problems with ARPANET
security.
• In June 1967, the Advanced Research Projects
Agency formed a taskforce to study the process of
securing the information in a computer system.
• The Rand Report R609 was the first recognised and
published document to classify the role of
management and policy issues in computer security.
• MULTICS was the first operating system to integrate
security into its core functions.[developed in the
mid-1960s by a consortium of General Electric, Bell
Labs and the Massachusetts Institute of Technology
6. 1990s
• Networking of computers became more
popular.
• Internet-The first global network of network.
• In the beginning , these connections were
based on de facto standards because industry
standards for network inter-connections did
not exist.
• As computer became available to public,
stored information became more exposed to
security threats.
7. 2000 to Present
• People are aware that information security is
important to national security.
• The increased threat of cyber security due to
proliferation of smart phones have become a
major issue in this era.
• Data theft due to hacking and cybercrimes have
made government and companies more aware of
the need of information security.
8. CONSLUSION
• Cyberspace is vulnerable to a broad spectrum of
hackers, criminals, terrorists, and state actors.
• The cybersecurity problem will never be solved once
and for all.
• But we have to Prevent attacks by taking proper
security measures.