Evolution of Cyber Security: A Brief History and its Importance

 

Evolution of Cyber Security:

A Brief History and its Importance

In times of prosperity, wealthy individuals often employ trained security forces or private guards to safeguard their assets and resist the threat of theft or burglary. The practice of hiring security forces for asset protection is still prevalent today. However, with the progress of time, there has been a significant transformation in the definition and nature of assets. In recent decades, information and data have become invaluable assets, surpassing the significance of land or monetary wealth. Consequently, the approach to safeguarding these assets has evolved, giving rise to the field of cybersecurity.

The relentless growth of cybercrime, fueled by the unrestrained use of advanced technology, has underscored the critical role of cybersecurity. In this article, we will explore what cybersecurity is, its essentiality, and some of its diverse forms.

 



What is Cybersecurity?

Cybersecurity refers to the measures taken to protect computer systems, networks, servers, and information from cyber-attacks, unauthorized access, or use. Much like the various security measures adopted to protect physical assets, cybersecurity ensures the safety of these virtual infrastructures. Given the current surge in cybercrime, the significance of cybersecurity has never been more pronounced.



 A Brief History of Cybersecurity

The foundation of cybersecurity was laid in the 1970s with the development of ARPANET, a project central to the modern internet network. During this time, Bob Thomas conceived the idea of transferring programs from one computer to another through ARPANET. His creation, the CREEPER program, contained a message saying, "I'M THE CREEPER: CATCH ME IF YOU CAN," successfully transferring itself to another computer on the ARPANET.

This development led to the birth of the first antivirus program called Reaper, designed by Ray Tomlinson. Reaper aimed to counteract the movement of CREEPER or delete it from computers. Although Reaper was arguably the world's first antivirus, its creator was unaware of its existence.

In 1987, German hacker and computer security specialist Bernd Fix created the first modern commercial antivirus software to combat the Vienna virus, which attacked DOS operating systems by corrupting .com files. Simultaneously, McAfee, a renowned antivirus manufacturer, introduced their VirusScan software to the market, furthering the commercialization of antivirus solutions.

For whom is cyber security important?

Cybersecurity is crucial for a wide range of entities, spanning from individuals to national institutions, due to the extensive proliferation of cybercrimes. The following are the types of organizations for which cybersecurity is particularly essential:

1. Financial Institutions:Any financial establishment is a primary target for cybercriminals. Cybercrimes involving hacking servers to embezzle substantial amounts of money are prevalent in the world of cybercrime.

2. National Institutions: National establishments are highly enticing targets for cybercriminals aiming to hack into systems to acquire valuable and sensitive information. The cybersecurity of national institutions tends to be comparably robust to counteract such threats.

3. Healthcare Organizations: Given the vast amount of information on individuals and the high demand for it in the black market, healthcare institutions are susceptible to significant cybersecurity risks.

4. Manufacturing Companies:Hackers often target manufacturers, stealing proprietary technology and business information for illicit gains. Consequently, these organizations face considerable cybersecurity threats.

5. E-commerce Platforms: In the realm of online commerce, customer information related to financial transactions is stored on e-commerce servers. This makes e-commerce platforms lucrative targets for cybercriminals.

 


What are the different types of cyber security systems?

Cybersecurity encompasses various strategies and approaches to safeguard against cyber threats. Commonly observed types include:

1. Network Security:In this domain, efforts are focused on identifying and resisting cyber attacks on networks.

2. Cloud Security:Ensures the security of all cloud-based applications, infrastructure, and data.

3. Endpoint Security:Ensures cybersecurity for devices commonly used by organizations, such as desktops and laptops.

4. Mobile Security: Protects mobile operating systems from unauthorized rooting and cyber attacks.

5. IoT (Internet of Things) Security:Ensures the security of devices within IoT networks.

6. Application Security:Focuses on defending applications against cyber attacks.

7. Zero Trust Security: Establishes security by controlling access to individual resources.

 


Is information security and cyber security the same thing?

Information security and cyber security sound very similar. So many may think that the two are the same thing. Cyber ​​security and information security are two different things, although they have many similarities in practice. Some more differences are highlighted in the table below:

CYBER SECURITY

INFORMATION SECURITY

Cyber ​​security is the combination of all methods and technologies to keep digital information and cyber space safe.

Information security is the measures to ensure the security of both digital and physical information.

Its main function is to prevent unauthorized access to digital data.

Its main function is to protect both digital and physical data from illegal access.

Provides protection from cyber crime and cyber fraud.

Provides protection against data fraud and data distortion.

This includes recovering lost data, creating security layers and installing anti-cyber attack software.

In this case, information security involves developing various strategies, finding solutions and managing risks.

 


last word

Starting from personal communication, education and business, everything is gradually going towards digitalization. This trend will increase in the future as a result of which most of the time of human life will be spent in cyber space. Cybercriminals are not sitting still to take advantage of this cyberspace dependence of people. Hence, proper implementation of cyber security is the only solution to have a healthy and safe cyber space.

 

Comments

Popular posts from this blog

SAKRAIN A KITE FESTIVAL

BANGLADESH’S 54 YEARS OF INDEPENDENCE