SlideShare a Scribd company logo
THE HISTORY OF CYBERSECURITY
Do you remember a time before cybersecurity? In the past decade we have become so dependent on
technology systems and devices that, for many of us, it’s hard to remember when protecting these wasn’t
integral to life and progress. But cybersecurity isn’t purely a modern invention - it has been around ever
since the first computers started handling data.
1940s. In 1943 the first digital computer was created. It wasn’t networked so threats at the time were
relatively low. However, this was also the decade in which the theory of potential computer viruses was
developed by one John von Neumann, laying the foundations for cybersecurity as we know it today.
1950s. The origins of hacking are thought to have begun in the 1950s with the trend for ‘phone breaking.’
This meant hijacking protocols that allowed engineers to work at a distance on phone networks so that
phone breakers could make no cost calls.
1960s. Computers were still not a product owned by most people and were often large and heavy.
However, the tech was developing - and so too was the wherewithal to attack it. The term ‘hacking’ was
first used in the 1960s. It was also the decade in which IBM invited students in to track and hack its
product, laying the foundation for the defensive strategy that underlies cybersecurity today.
1970s. Most computers still relied on telephone networks for connectivity but the origins of the internet
appeared during the 1970s. The Advanced Research Projects Agency Network (ARPANET) was the
precursor to the internet. This was the decade that large institutions started to do cybersecurity
contingency planning and the first cyber criminal was arrested - in 1979,16 year old Kevin Mitnick hacked
a huge digital system called The Ark.
1980s. In 1986 a German hacker managed to infiltrate government systems and access US 400 military
computers by piggybacking on ARPANET. This was the first high profile hack and threw security into the
spotlight. Especially as the hacker had planned to sell military secrets to the KGB. A year later, the first
commercial antivirus products were released - just in time as the Vienna virus, one of the first forms of
malware, was also unleashed.
1990s. With the internet now firmly entrenched and the tech industry on overdrive, this was the decade
when cyber security increased exponentially. The first virus to mutate as it infects was developed and
hackers started using tools, such as freebies to reach new victims - the Diskkiller virus was delivered via a
disk that came free with PC Today magazine. The internet was evolving too - Secure Socket Layer (SSL)
to protect activities such as online buying was created in 1995.
2000s. Most homes now had computers and the internet was growing, fast. The first hacker group -
Anonymous - was established and gained prominence when it hacked The Church of Scientology. Credit
card attacks, email attacks and state-sponsored hacking all began to gain attention during the 2000s. As
a result a range of new detection and security measures also arrived, from Network Behavioural Analysis
to web application firewalls.
This brief history of cybersecurity shows just how far we’ve come in a few decades. You can do more to
protect your business today, and for the future, with comprehensive cybersecurity in place.
Please visit: https://servnetuk.com/blog/history-cybersecurity

More Related Content

Similar to The History of Cybersecurity - Servnet.pdf

HISTORY OF CYBERSECURITY BY NEET.pptx
HISTORY OF CYBERSECURITY BY NEET.pptxHISTORY OF CYBERSECURITY BY NEET.pptx
HISTORY OF CYBERSECURITY BY NEET.pptx
NeelJhala
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
kailash shaw
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
Sharique Masood
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
Dr. Arun Verma
 
Please reply one paragraph you thoughts on this research  Int.docx
Please reply one paragraph you thoughts on this research  Int.docxPlease reply one paragraph you thoughts on this research  Int.docx
Please reply one paragraph you thoughts on this research  Int.docx
mattjtoni51554
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
msolis0710
 
The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ...
 The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ... The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ...
The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ...
Virtu Institute
 
Network security history
Network security historyNetwork security history
Network security history
shahab ali
 
The evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxThe evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docx
NigussMehari4
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
ssuser719d6b
 
Hacked Revealed: Penetration Profession
Hacked Revealed: Penetration ProfessionHacked Revealed: Penetration Profession
Hacked Revealed: Penetration Profession
Haris Tahir
 
Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information security
Neha Raju k
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
pavankumarmangena
 
A Brief Look at Cybersecurity Issues Over Time
A Brief Look at Cybersecurity Issues Over TimeA Brief Look at Cybersecurity Issues Over Time
A Brief Look at Cybersecurity Issues Over Time
Wayne Schepens
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
Bharat Thakkar
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
Savigya Singh
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
Dinesh O Bareja
 
Handout web technology.doc1
Handout web technology.doc1Handout web technology.doc1
Handout web technology.doc1
mikeade30002
 
Cyber security
Cyber securityCyber security
Cyber security
safeedu
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
kibrutry
 

Similar to The History of Cybersecurity - Servnet.pdf (20)

HISTORY OF CYBERSECURITY BY NEET.pptx
HISTORY OF CYBERSECURITY BY NEET.pptxHISTORY OF CYBERSECURITY BY NEET.pptx
HISTORY OF CYBERSECURITY BY NEET.pptx
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Please reply one paragraph you thoughts on this research  Int.docx
Please reply one paragraph you thoughts on this research  Int.docxPlease reply one paragraph you thoughts on this research  Int.docx
Please reply one paragraph you thoughts on this research  Int.docx
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ...
 The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ... The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ...
The Growth of eBusiness - Lecture 1 VDIS10026 Managing Design and eBusiness ...
 
Network security history
Network security historyNetwork security history
Network security history
 
The evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxThe evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docx
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
 
Hacked Revealed: Penetration Profession
Hacked Revealed: Penetration ProfessionHacked Revealed: Penetration Profession
Hacked Revealed: Penetration Profession
 
Information security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information securityInformation security fundamentals topic 2: Evolution of Information security
Information security fundamentals topic 2: Evolution of Information security
 
Ethicalhacking
Ethicalhacking Ethicalhacking
Ethicalhacking
 
A Brief Look at Cybersecurity Issues Over Time
A Brief Look at Cybersecurity Issues Over TimeA Brief Look at Cybersecurity Issues Over Time
A Brief Look at Cybersecurity Issues Over Time
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Handout web technology.doc1
Handout web technology.doc1Handout web technology.doc1
Handout web technology.doc1
 
Cyber security
Cyber securityCyber security
Cyber security
 
Chapter 1 a
Chapter 1 aChapter 1 a
Chapter 1 a
 

Recently uploaded

Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
Christian Dahlen
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
my Pandit
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Adam Smith
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
Chandresh Chudasama
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
thesiliconleaders
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
SOFTTECHHUB
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
SEOSMMEARTH
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
AnnySerafinaLove
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
Susan Laney
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Avirahi City Dholera
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
Adnet Communications
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 

Recently uploaded (20)

Industrial Tech SW: Category Renewal and Creation
Industrial Tech SW:  Category Renewal and CreationIndustrial Tech SW:  Category Renewal and Creation
Industrial Tech SW: Category Renewal and Creation
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
Unveiling the Dynamic Personalities, Key Dates, and Horoscope Insights: Gemin...
 
The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...The Influence of Marketing Strategy and Market Competition on Business Perfor...
The Influence of Marketing Strategy and Market Competition on Business Perfor...
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
Hamster Kombat' Telegram Game Surpasses 100 Million Players—Token Release Sch...
 
3 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 20243 Simple Steps To Buy Verified Payoneer Account In 2024
3 Simple Steps To Buy Verified Payoneer Account In 2024
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
Anny Serafina Love - Letter of Recommendation by Kellen Harkins, MS.
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
buy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accountsbuy old yahoo accounts buy yahoo accounts
buy old yahoo accounts buy yahoo accounts
 
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraTata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s Dholera
 
Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024Lundin Gold Corporate Presentation - June 2024
Lundin Gold Corporate Presentation - June 2024
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 

The History of Cybersecurity - Servnet.pdf

  • 1. THE HISTORY OF CYBERSECURITY Do you remember a time before cybersecurity? In the past decade we have become so dependent on technology systems and devices that, for many of us, it’s hard to remember when protecting these wasn’t integral to life and progress. But cybersecurity isn’t purely a modern invention - it has been around ever since the first computers started handling data. 1940s. In 1943 the first digital computer was created. It wasn’t networked so threats at the time were relatively low. However, this was also the decade in which the theory of potential computer viruses was developed by one John von Neumann, laying the foundations for cybersecurity as we know it today. 1950s. The origins of hacking are thought to have begun in the 1950s with the trend for ‘phone breaking.’ This meant hijacking protocols that allowed engineers to work at a distance on phone networks so that phone breakers could make no cost calls. 1960s. Computers were still not a product owned by most people and were often large and heavy. However, the tech was developing - and so too was the wherewithal to attack it. The term ‘hacking’ was first used in the 1960s. It was also the decade in which IBM invited students in to track and hack its product, laying the foundation for the defensive strategy that underlies cybersecurity today. 1970s. Most computers still relied on telephone networks for connectivity but the origins of the internet appeared during the 1970s. The Advanced Research Projects Agency Network (ARPANET) was the precursor to the internet. This was the decade that large institutions started to do cybersecurity contingency planning and the first cyber criminal was arrested - in 1979,16 year old Kevin Mitnick hacked a huge digital system called The Ark. 1980s. In 1986 a German hacker managed to infiltrate government systems and access US 400 military computers by piggybacking on ARPANET. This was the first high profile hack and threw security into the
  • 2. spotlight. Especially as the hacker had planned to sell military secrets to the KGB. A year later, the first commercial antivirus products were released - just in time as the Vienna virus, one of the first forms of malware, was also unleashed. 1990s. With the internet now firmly entrenched and the tech industry on overdrive, this was the decade when cyber security increased exponentially. The first virus to mutate as it infects was developed and hackers started using tools, such as freebies to reach new victims - the Diskkiller virus was delivered via a disk that came free with PC Today magazine. The internet was evolving too - Secure Socket Layer (SSL) to protect activities such as online buying was created in 1995. 2000s. Most homes now had computers and the internet was growing, fast. The first hacker group - Anonymous - was established and gained prominence when it hacked The Church of Scientology. Credit card attacks, email attacks and state-sponsored hacking all began to gain attention during the 2000s. As a result a range of new detection and security measures also arrived, from Network Behavioural Analysis to web application firewalls. This brief history of cybersecurity shows just how far we’ve come in a few decades. You can do more to protect your business today, and for the future, with comprehensive cybersecurity in place. Please visit: https://servnetuk.com/blog/history-cybersecurity