Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
THEHISTORYOFETHICALHACKING
TIMELINE1939-2014
THEFUTUREOFETHICALHACKING
The “bombe” becomes the world’s first
ethical hacki...
Upcoming SlideShare
Loading in …5
×

The History of Ethical Hacking and Penetration Testing

11,851 views

Published on

When we think of hackers, the black hat variety usually comes to mind. However, white hat hacking, also known as "ethical hacking", has been around as early as the 1960's. Check out the infographic above to see how it all started, where it is today, and trends we expect to see in the near future.

Follow us on Twitter @installCore!

Check out our website: www.installcore.com

Published in: Software, Technology
  • Discover the secrets to getting a bigger penis naturally with this 100% free.  https://tinyurl.com/yaygh4xh
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Sex in your area for one night is there tinyurl.com/hotsexinarea Copy and paste link in your browser to visit a site)
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • A Penis Growth Program With Actual Video Proof That It Works! REAL Growth With Video Proof, You Can't Fake These Enlargement Results... ■■■ https://tinyurl.com/getpebible2019
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Have You Seen Linda Allen's new Candida System yet? It's called "Yeast Infection No More" I've read the whole thing (all 150 pages) and there's some great information in there about how to naturally and permanently eliminate your yeast infection without drugs, creams or any kind of gimmicks. I highly recommend it - it's very honest and straightforward without all the hype and b.s. you see all over the net these days. Here's the website where you can get more information: ●●● https://tinyurl.com/y3flbeje
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • The Scrambler Unlock Her Legs | 95% Off by Bobby Rio-Rob Judge? ■■■ http://ishbv.com/unlockher/pdf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

The History of Ethical Hacking and Penetration Testing

  1. 1. THEHISTORYOFETHICALHACKING TIMELINE1939-2014 THEFUTUREOFETHICALHACKING The “bombe” becomes the world’s first ethical hacking machine. It was used by the British to help decipher encrypted German messages during World War II. Computer “penetration” is first discussed by leading experts, with mention of deliberate tests by professionals. The first “tiger team” is formed. USAF contracted James Anderson to test time-sharing systems. The US Computer Fraud and Abuse Act makes black and gray hat hacking a criminal offense. The US Air Force conducts one of the first ethical hacks to test the security of the Multics operating system. The PTES is founded leading to an increase in ethical hacking jobs. They offer businesses and security service providers a common language and scope for performing penetration testing. 1939 1960 1971 1974 1986 1995 1999 2003 2009 2014 [1] https://www.trustwave.com/trustednews/2013/09/infographic-timeline-15-key-dates-ethical-hacking-history/ [2] http://www.businessinsider.com/google-paid-white-hat-hackers-more-than-15-million-dollars-2015-1#ixzz3UZIA71UG [3] http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history [4] http://www.codesandciphers.org.uk/virtualbp/tbombe/thebmb.htm [5] http://www.rsaconference.com/writable/presentations/file_upload/tech-w02-a-penetration-testing-model_v2.pdf [6] http://www.gartner.com/newsroom/id/2828722 Attacking your own defense to locate weaknesses has been around for over 1,500 years. Ethical hacking brings that practice into the digital world Google paid white hat hackers more than $1.5 million in 2014 to find bugs The term “ethical hacking” was first used by IBM’s John Patrick in 1995 The First Bug Bounty Program was launched by Netscape in 1995. Hackers were offered rewards for reporting vulnerabilites to the company before they could be exploited Dan Farmer and Wietse Venema release SATAN, an automated vulnerability scanner, which becomes a popular hacking tool. OWASP releases the first OWASP Testing Guide to help teach best practices in penetration testing. Worldwide enterprise security spending reaches $71.1B. Security executives begin to use on-demand penetration testing services for cost effective ethical hacking. Software security goes mainstream with Microsoft's Windows 98 release, 1999 becomes a banner year for security (and hacking). BUGBOUNTYPROGRAMSGROWINPOPULARITY FORMALGUIDELINES&PRACTICESDEVELOP CERTIFICATIONCOURSESBECOMETHENORM ETHICALHACKINGPRACTICESENTERIOTSPACE PTES Netscape 20142013 2015 $65.5B $71.1B $76.9B$75.9B

×