Evolution of Cyber Security: A Brief History and its Importance
Evolution of Cyber
Security:
A Brief History and its
Importance
In times of prosperity, wealthy individuals often employ
trained security forces or private guards to safeguard their assets and resist
the threat of theft or burglary. The practice of hiring security forces for
asset protection is still prevalent today. However, with the progress of time,
there has been a significant transformation in the definition and nature of
assets. In recent decades, information and data have become invaluable assets,
surpassing the significance of land or monetary wealth. Consequently, the
approach to safeguarding these assets has evolved, giving rise to the field of
cybersecurity.
The relentless growth of cybercrime, fueled by the
unrestrained use of advanced technology, has underscored the critical role of
cybersecurity. In this article, we will explore what cybersecurity is, its
essentiality, and some of its diverse forms.
Cybersecurity refers to the measures taken to protect computer
systems, networks, servers, and information from cyber-attacks, unauthorized
access, or use. Much like the various security measures adopted to protect
physical assets, cybersecurity ensures the safety of these virtual
infrastructures. Given the current surge in cybercrime, the significance of
cybersecurity has never been more pronounced.
A Brief History of
Cybersecurity
The foundation of cybersecurity was laid in the 1970s with
the development of ARPANET, a project central to the modern internet network.
During this time, Bob Thomas conceived the idea of transferring programs from
one computer to another through ARPANET. His creation, the CREEPER program,
contained a message saying, "I'M THE CREEPER: CATCH ME IF YOU CAN,"
successfully transferring itself to another computer on the ARPANET.
This development led to the birth of the first antivirus
program called Reaper, designed by Ray Tomlinson. Reaper aimed to counteract
the movement of CREEPER or delete it from computers. Although Reaper was
arguably the world's first antivirus, its creator was unaware of its existence.
In 1987, German hacker and computer security specialist
Bernd Fix created the first modern commercial antivirus software to combat the
Vienna virus, which attacked DOS operating systems by corrupting .com files.
Simultaneously, McAfee, a renowned antivirus manufacturer, introduced their VirusScan software to the market, furthering the
commercialization of antivirus solutions.
For whom is cyber security important?
Cybersecurity is crucial for a wide range of entities,
spanning from individuals to national institutions, due to the extensive
proliferation of cybercrimes. The following are the types of organizations for
which cybersecurity is particularly essential:
1. Financial Institutions:Any financial establishment is a
primary target for cybercriminals. Cybercrimes involving hacking servers to
embezzle substantial amounts of money are prevalent in the world of cybercrime.
2. National Institutions: National establishments are
highly enticing targets for cybercriminals aiming to hack into systems to
acquire valuable and sensitive information. The cybersecurity of national
institutions tends to be comparably robust to counteract such threats.
3. Healthcare Organizations: Given the vast amount of
information on individuals and the high demand for it in the black market,
healthcare institutions are susceptible to significant cybersecurity risks.
4. Manufacturing Companies:Hackers often target
manufacturers, stealing proprietary technology and business information for
illicit gains. Consequently, these organizations face considerable
cybersecurity threats.
5. E-commerce Platforms: In the realm of online commerce,
customer information related to financial transactions is stored on e-commerce
servers. This makes e-commerce platforms lucrative targets for cybercriminals.
What are the different types of cyber security systems?
Cybersecurity encompasses various strategies and approaches
to safeguard against cyber threats. Commonly observed types include:
1. Network Security:In this domain, efforts are focused on
identifying and resisting cyber attacks on networks.
2. Cloud Security:Ensures the security of all cloud-based
applications, infrastructure, and data.
3. Endpoint Security:Ensures cybersecurity for devices
commonly used by organizations, such as desktops and laptops.
4. Mobile Security: Protects mobile operating systems from
unauthorized rooting and cyber attacks.
5. IoT (Internet of Things) Security:Ensures the security
of devices within IoT networks.
6. Application Security:Focuses on defending applications
against cyber attacks.
7. Zero Trust Security: Establishes security by controlling
access to individual resources.
Is information security and cyber security the same thing?
Information security and
cyber security sound very similar. So many may think that the two are the same
thing. Cyber security and information
security are two different things, although they have many similarities in
practice. Some more differences are highlighted in the table below:
|
CYBER SECURITY |
INFORMATION SECURITY |
|
Cyber security is the combination of all methods and
technologies to keep digital information and cyber space safe. |
Information security is the measures to ensure the
security of both digital and physical information. |
|
Its main function is to prevent unauthorized access to
digital data. |
Its main function is to protect both digital and physical
data from illegal access. |
|
Provides protection from cyber crime and cyber fraud. |
Provides protection against data fraud and data
distortion. |
|
This includes recovering lost data, creating security
layers and installing anti-cyber attack software. |
In this case, information security involves developing
various strategies, finding solutions and managing risks. |
last word
Starting from personal communication, education and
business, everything is gradually going towards digitalization. This trend will
increase in the future as a result of which most of the time of human life will
be spent in cyber space. Cybercriminals are not sitting still to take advantage
of this cyberspace dependence of people. Hence, proper implementation of cyber
security is the only solution to have a healthy and safe cyber space.




Comments
Post a Comment