2. introduction
◦ Computer security, cybersecurity, or information technology security (IT security) is the
protection of computer systems and networks from information disclosure, theft of or damage to
their hardware, software, or electronic data, as well as from the disruption or misdirection of the
services they provide.[1]
◦ The field is becoming increasingly significant due to the continuously expanding reliance
on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-
Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the
various devices that constitute the "Internet of things". Cybersecurity is also one of the
significant challenges in the contemporary world, due to its complexity, both in terms of political
usage and technology. Its primary goal is to ensure the system's dependability, integrity, and
data privacy.
3. history
◦ Since the Internet's arrival and with the digital transformation initiated in recent years, the notion of cybersecurity has become a familiar subject both in our
professional and personal lives. Cybersecurity and cyber threats have been constant for the last 50 years of technological change. In the 1970s and 1980s,
computer security was mainly limited to academia until the conception of the Internet, where, with increased connectivity, computer viruses and network
intrusions began to take off. After the spread of viruses in the 1990s, the 2000s marked the institutionalization of cyber threats and cybersecurity.
◦ Finally, from the 2010s, large-scale attacks and government regulations started emerging.
◦ The April 1967 session organized by Willis Ware at the Spring Joint Computer Conference, and the later publication of the Ware Report, were foundational
moments in the history of the field of computer security.]Ware's work straddled the intersection of material, cultural, political, and social concerns.
◦ A 1977 NIST publication] introduced the "CIA triad" of Confidentiality, Integrity, and Availability as a clear and simple way to describe key security
goals.While still relevant, many more elaborate frameworks have since been proposed.
◦ However, the 1970s and 1980s didn't have any grave computer threats because computers and the internet were still developing, and security threats were
easily identifiable. Most often, threats came from malicious insiders who gained unauthorized access to sensitive documents and files. Although malware and
network breaches existed during the early years, they did not use them for financial gain. However, by the second half of the 1970s, established computer
firms like IBM started offering commercial access control systems and computer security software products.
◦ It started with Creeper in 1971. Creeper was an experimental computer program written by Bob Thomas at BBN. It is considered the first computer worm.
◦ In 1972, the first anti-virus software was created, called Reaper. It was created by Ray Tomlinson to move across the ARPANET and delete
the Creeper worm.
4. Need of cyber security
◦ Cybersecurity is important because it
protects all categories of data from theft
and damage. This includes sensitive
data, personally identifiable information
(PII), protected health information (PHI),
personal information, intellectual property,
data, and governmental and industry
information systems.
◦ Without a cybersecurity program, your
organization cannot defend itself against
data breach campaigns, which makes it
an irresistible target for cybercriminals.
5. Why is Cybercrime Increasing?
◦ Information theft is the most expensive and fastest-growing segment of cybercrime. Largely driven by the
increasing exposure of identity information to the web via cloud services.
◦ But it's not the only target. Industrial controls that manage power grids and other infrastructure can be disrupted or
destroyed. And identity theft isn't the only goal, cyber attacks may aim to compromise data integrity (destroy or
change data) to breed distrust in an organization or government.
◦ Cybercriminals are becoming more sophisticated, changing what they target, how they affect organizations and
their methods of attack for different security systems.
◦ Other factors driving the growth in cybercrime include:
• The distributed nature of the Internet
• The ability for cybercriminals to attack targets outside their jurisdiction makes policing extremely difficult
• Increasing profitability and ease of commerce on the dark web
• The proliferation of mobile devices and the Internet of Things.