SlideShare a Scribd company logo
1 of 67
Download to read offline
Once upon a time…
InfoSec History 101
Jack Daniel Security BSides Tenable Network Security
Sound Check
Once upon a time…
InfoSec History 101
Jack Daniel Security BSides Tenable Network Security
But first…
I am ignorant
I am ignorant
Don’t laugh, we all are.
If security were music
we could trace its roots
Can we say that about our profession?
Join me for a journey
through
early-mid 20th century music
Middle Eastern Folk
Misirlou
Michalis Batrinos
Jewish Folk
Hava Nagila
The Klezmer Lounge Band
Delta Blues
Traveling Riverside Blues
Robert Johnson
Chicago Blues
Killing Floor
Howlin’ Wolf
Early rock – proto metal – proto punk
Rumble
Link Wray
Early rock – proto metal – proto punk
Rumble
Link Wray
Early rock – proto metal – proto punk
Rumble
Link Wray
Early rock – proto metal – proto punk
Rumble on the Docks
Link Wray
Early rock – Surf guitar
Dick Dale
Hava Nagila
Early rock – Surf guitar
Dick Dale
Miserlou
“Classic” Rock
Lemon Song
Led Zeppelin
Proto-punk? Proto Grunge?
The Sonics
Strychnine
Want more perspectives?
Check out the documentary “It Might Get Loud”
Trace Herbie Hancock’s music through the decades
Find the BBC4 documentary on the song Summertime
Now try that with infosec…
Why look back?
Image credit: Pratheep P S, www. Pratheep.comCC BY-SA 3.0
Why we don’t know
who and what
we don’t know
Things were different
We can’t keep up
Not even a 404
.mil, .gov, .edu
No longer active
Not on the “con circuit”
You know the names,
do you know the people?
You certainly know of Alan Turing
By GabboT (12 Yearsa Slave 38) [CC BY-SA 2.0]
You certainly know of Alan Turing
But you probably never heard of
Harold “Doc” Keene
And you probably don’t know
Henryk Zygalski
Or
Jerzy Różycki
And probably not
Marian Rejewski
You know the names, do you know the people?
Diffie-Hellman
You know the names, do you know the people?
Whitfield Diffie
Marty Hellman
Image Credit: ChuckPainter/StanfordNews Servicevia livinginternet.com
But have you heard of
Ralph Merkle
Image Credit: ChuckPainter/StanfordNews Servicevia livinginternet.com
You know the names, do you know the people?
Ron Rivest
Adi Shamir
Len Adleman
Image Credit: unknown, via viterbi.usc.edu
You know the names, do you know the people?
Ron Rivest
Adi Shamir
Len Adleman
Image Credit: SteveMaller, courtesy RSA®Conference,via Viterbi.usc.edu
But you probably don’t know
James Ellis
Clifford Cocks
Malcolm Williamson
But you probably don’t know
James Ellis
Image Credit: unknown, via http://cs-exhibitions.uni-klu.ac.at/index.php?id=344
But you probably don’t know
Clifford Cocks
Image Credit: unknown, via http://www.bbc.com/news/uk-england-gloucestershire-11475101
But you probably don’t know
Malcolm Williamson
Image Credit: unknown, via http://www.livinginternet.com/i/is_crypt_pkc_inv.htm#gchq
Twelve People
Some you know
Some you’ve heard of
Some likely unknown to you
Nevil Maskeline
Victorian-era magician, inventor, and hacker
Admiral Grace Hopper
You know her stories, right?
If not, you have homework.
Dr. Eugene Spafford
“Spaf”
Image Credit: unknown,
via http://spaf.cerias.purdue.edu/images/spaf_large.jpg
Becky Bace
The Den Mother of Intrusion Detection
The Cranky Broad
Image Credit: unknown,
via http://www.infidel.net/infidels/bacebio/
Robert T Morris
He’s why we have a CERT
Image Credit: TrevorBlackwell
Robert Morris
His kid kinda embarrassed him
Image credit:
Paul O. BoisvertforThe New YorkTimes
Willis Ware
The Ware Report
and much more
Image Credit: unknown, via rand.org
Dorothy Denning
“Clipper Chick”
Image Credit: unknown,
Via http://faculty.nps.edu/dedennin/
Steve Lipner
“I’m only doing this until
they hire the right person”
Image Credit: Unknown,
Via http://www.infosecurity-magazine.com/
Bob Abbott
From Cray OS
to open-heart surgery systems
and “Sneakers”
Image credit:Unknown,
Via http://www.computer-history.info/Page1.dir/pages/Abbott.html
Jim Anderson
Meteorologist,
Gunnery/Radio Officer,
InfoSec Pioneer
Image Credit: US Naval Postgrad School via YouTube
René Carmille
Hacker, hero, martyr.
If I have seen further it is by
standing on the shoulders of giants
shouldersofinfosec.org
Many people have contributed to this project
Thanks to all who helped, including:
Becky Bace
Marcus Ranum
The CISSP Usual Suspects
The Epic Accidental Skype Group Chat
Davi Ottenheimer
Rsnake
And special thanks to:
Spaf - Dr. Eugene Spafford
Shameless Self Promotion:
My Blogs:
blog.uncommonsensesecurity.com
travelingcurmudgeon.blogspot.com
Security Weekly Podcast:
securityweekly.com
(formerly Pauldotcom)
And, of course, Twitter
@jack_daniel
@InfosecNoir
ShouldersOfInfosec.org
Lists all of the people in today’s presentation,
with a few notes and relevant links.
This is a work in progress, and you can help.
The End
The Beginning

More Related Content

What's hot (11)

Kraft.Madison.Jeporady
Kraft.Madison.JeporadyKraft.Madison.Jeporady
Kraft.Madison.Jeporady
 
Heavy Metal
Heavy Metal Heavy Metal
Heavy Metal
 
Planning production
Planning productionPlanning production
Planning production
 
American culture jeopardy
American culture jeopardyAmerican culture jeopardy
American culture jeopardy
 
American cinema
American cinemaAmerican cinema
American cinema
 
Theguesswho
TheguesswhoTheguesswho
Theguesswho
 
Koffe an Kreem Records
Koffe an Kreem RecordsKoffe an Kreem Records
Koffe an Kreem Records
 
BillClientListAestheticom
BillClientListAestheticomBillClientListAestheticom
BillClientListAestheticom
 
Planning production
Planning productionPlanning production
Planning production
 
Hugh Laurie
Hugh LaurieHugh Laurie
Hugh Laurie
 
Rock and Roll and Race
Rock and Roll and Race Rock and Roll and Race
Rock and Roll and Race
 

Viewers also liked

The Modern Telco Network: Defining The Telco Cloud
The Modern Telco Network: Defining The Telco CloudThe Modern Telco Network: Defining The Telco Cloud
The Modern Telco Network: Defining The Telco Cloud
Marco Rodrigues
 
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
OpenStack Korea Community
 

Viewers also liked (9)

IT Governance – The missing compass in a technology changing world
 IT Governance – The missing compass in a technology changing world IT Governance – The missing compass in a technology changing world
IT Governance – The missing compass in a technology changing world
 
The spirit of Opensource - lets plan to contribute ! @JWC16
The spirit of Opensource - lets plan to contribute ! @JWC16The spirit of Opensource - lets plan to contribute ! @JWC16
The spirit of Opensource - lets plan to contribute ! @JWC16
 
The Modern Telco Network: Defining The Telco Cloud
The Modern Telco Network: Defining The Telco CloudThe Modern Telco Network: Defining The Telco Cloud
The Modern Telco Network: Defining The Telco Cloud
 
Telco Business & Technology
Telco Business & TechnologyTelco Business & Technology
Telco Business & Technology
 
Prepare Yourself to Become Infosec Professional
Prepare Yourself to Become Infosec ProfessionalPrepare Yourself to Become Infosec Professional
Prepare Yourself to Become Infosec Professional
 
[OpenStack Day in Korea 2015] Keynote 2 - Leveraging OpenStack to Realize the...
[OpenStack Day in Korea 2015] Keynote 2 - Leveraging OpenStack to Realize the...[OpenStack Day in Korea 2015] Keynote 2 - Leveraging OpenStack to Realize the...
[OpenStack Day in Korea 2015] Keynote 2 - Leveraging OpenStack to Realize the...
 
[OpenStack Days Korea 2016] How open HW and SW drives telco infrastucture inn...
[OpenStack Days Korea 2016] How open HW and SW drives telco infrastucture inn...[OpenStack Days Korea 2016] How open HW and SW drives telco infrastucture inn...
[OpenStack Days Korea 2016] How open HW and SW drives telco infrastucture inn...
 
[OpenStack Days Korea 2016] Innovating OpenStack Network with SDN solution
[OpenStack Days Korea 2016] Innovating OpenStack Network with SDN solution[OpenStack Days Korea 2016] Innovating OpenStack Network with SDN solution
[OpenStack Days Korea 2016] Innovating OpenStack Network with SDN solution
 
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
[OpenStack 하반기 스터디] Interoperability with ML2: LinuxBridge, OVS and SDN
 

Similar to The Shoulders of InfoSec Project by Jack Daniel

Dyuthi finals dry 1
Dyuthi finals dry 1Dyuthi finals dry 1
Dyuthi finals dry 1
amith
 
Eve 1950's Topic Homework
Eve 1950's Topic HomeworkEve 1950's Topic Homework
Eve 1950's Topic Homework
hpy6
 

Similar to The Shoulders of InfoSec Project by Jack Daniel (20)

Akosha Quiz Ep 1
Akosha Quiz Ep 1Akosha Quiz Ep 1
Akosha Quiz Ep 1
 
Dyuthi finals dry 1
Dyuthi finals dry 1Dyuthi finals dry 1
Dyuthi finals dry 1
 
Virtual celebrities
Virtual celebritiesVirtual celebrities
Virtual celebrities
 
Virtual Celebrities
Virtual CelebritiesVirtual Celebrities
Virtual Celebrities
 
Genaral
GenaralGenaral
Genaral
 
DLA FY Quiz 2022 - Round 2
DLA FY Quiz 2022 - Round 2DLA FY Quiz 2022 - Round 2
DLA FY Quiz 2022 - Round 2
 
CQC Open2013 Finals
CQC Open2013 FinalsCQC Open2013 Finals
CQC Open2013 Finals
 
The 1980’s
The 1980’sThe 1980’s
The 1980’s
 
1950's Music
1950's Music1950's Music
1950's Music
 
Wagon Days1
Wagon Days1Wagon Days1
Wagon Days1
 
Aranya Quiz General
Aranya Quiz GeneralAranya Quiz General
Aranya Quiz General
 
QMQ 23/10/16
QMQ 23/10/16QMQ 23/10/16
QMQ 23/10/16
 
Eve 1950's Topic Homework
Eve 1950's Topic HomeworkEve 1950's Topic Homework
Eve 1950's Topic Homework
 
Quiz contest 2
Quiz contest 2Quiz contest 2
Quiz contest 2
 
Quiz contest 2
Quiz contest 2Quiz contest 2
Quiz contest 2
 
Weird - General Quiz
Weird - General QuizWeird - General Quiz
Weird - General Quiz
 
1950s
1950s1950s
1950s
 
Halloween-Spongebob-Ki
Halloween-Spongebob-KiHalloween-Spongebob-Ki
Halloween-Spongebob-Ki
 
Metal Presentation AS Sam White
Metal Presentation AS Sam WhiteMetal Presentation AS Sam White
Metal Presentation AS Sam White
 
Metal Presentation
Metal PresentationMetal Presentation
Metal Presentation
 

More from EC-Council

Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
EC-Council
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
EC-Council
 

More from EC-Council (20)

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
 
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law EnforcementHacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

The Shoulders of InfoSec Project by Jack Daniel