Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
THEHISTORYOFETHICALHACKING
TIMELINE1939-2014
THEFUTUREOFETHICALHACKING
The “bombe” becomes the world’s first
ethical hacki...
Upcoming SlideShare
Loading in …5
×

The History of Ethical Hacking and Penetration Testing

11,484 views

Published on

When we think of hackers, the black hat variety usually comes to mind. However, white hat hacking, also known as "ethical hacking", has been around as early as the 1960's. Check out the infographic above to see how it all started, where it is today, and trends we expect to see in the near future.

Follow us on Twitter @installCore!

Check out our website: www.installcore.com

Published in: Software, Technology
  • Nice !! Download 100 % Free Ebooks, PPts, Study Notes, Novels, etc @ https://www.ThesisScientist.com
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Hello! Get Your Professional Job-Winning Resume Here - Check our website! https://vk.cc/818RFv
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

The History of Ethical Hacking and Penetration Testing

  1. 1. THEHISTORYOFETHICALHACKING TIMELINE1939-2014 THEFUTUREOFETHICALHACKING The “bombe” becomes the world’s first ethical hacking machine. It was used by the British to help decipher encrypted German messages during World War II. Computer “penetration” is first discussed by leading experts, with mention of deliberate tests by professionals. The first “tiger team” is formed. USAF contracted James Anderson to test time-sharing systems. The US Computer Fraud and Abuse Act makes black and gray hat hacking a criminal offense. The US Air Force conducts one of the first ethical hacks to test the security of the Multics operating system. The PTES is founded leading to an increase in ethical hacking jobs. They offer businesses and security service providers a common language and scope for performing penetration testing. 1939 1960 1971 1974 1986 1995 1999 2003 2009 2014 [1] https://www.trustwave.com/trustednews/2013/09/infographic-timeline-15-key-dates-ethical-hacking-history/ [2] http://www.businessinsider.com/google-paid-white-hat-hackers-more-than-15-million-dollars-2015-1#ixzz3UZIA71UG [3] http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history [4] http://www.codesandciphers.org.uk/virtualbp/tbombe/thebmb.htm [5] http://www.rsaconference.com/writable/presentations/file_upload/tech-w02-a-penetration-testing-model_v2.pdf [6] http://www.gartner.com/newsroom/id/2828722 Attacking your own defense to locate weaknesses has been around for over 1,500 years. Ethical hacking brings that practice into the digital world Google paid white hat hackers more than $1.5 million in 2014 to find bugs The term “ethical hacking” was first used by IBM’s John Patrick in 1995 The First Bug Bounty Program was launched by Netscape in 1995. Hackers were offered rewards for reporting vulnerabilites to the company before they could be exploited Dan Farmer and Wietse Venema release SATAN, an automated vulnerability scanner, which becomes a popular hacking tool. OWASP releases the first OWASP Testing Guide to help teach best practices in penetration testing. Worldwide enterprise security spending reaches $71.1B. Security executives begin to use on-demand penetration testing services for cost effective ethical hacking. Software security goes mainstream with Microsoft's Windows 98 release, 1999 becomes a banner year for security (and hacking). BUGBOUNTYPROGRAMSGROWINPOPULARITY FORMALGUIDELINES&PRACTICESDEVELOP CERTIFICATIONCOURSESBECOMETHENORM ETHICALHACKINGPRACTICESENTERIOTSPACE PTES Netscape 20142013 2015 $65.5B $71.1B $76.9B$75.9B

×