The first modern computer, was brought online in 1945, cybersecurity




Download 48.5 Kb.
bet2/4
Sana23.01.2024
Hajmi48.5 Kb.
#143790
1   2   3   4
Bog'liq
When
ppt 1, Oraliq nazorat Javoblari, 5-mustaqil ish, 5-мустақил иш, Илмий тадқиқот методологияси ишчи дастур 2020, grokking-algorithms-illustrated-programmers-curious, Allayarov A. 2, ТПроформа договора по лоту №73719 (1), 7-topshiriq, 7-8-9 lab, Amplitudali modulyatsiya, 1-1610, fazliddin fozilov 123, Dasturlash 3 natija, Calendar plan-Maxsus fanlarni o\'qitish metodikasi (3)
The 1970’s
The creation of ARPANET, the earliest form of the internet, gave hackers a lot to think about and explore. ARPANET was a testing ground for new technologies, and the hacker and technical communities busied themselves with developing and prototyping new technologies, including email. There were a few adventures into the development of malware (short for malicious software), including Creeper and Reaper, the first computer worms, but these were academic exercises more than anything else.
I'M THE CREEPER; CATCH ME IF YOU CAN
The message you would have seen if you received a visit from Creeper!
In this era of rapid development and experimentation, the security of the technology being developed was not a concern. The widespread view of ARPANET as a cooperative academic endeavor and the absence of well-established best practices meant that the motivation and means to design secure systems and software were limited. However, people were starting to think about security. A 1975 paper titled The Protection of Information in Computer Systems presented principles and concepts that would become critical to cybersecurity in the future.
The 1980’s
The 1980s were a chaotic time; the Internet was formed in 1983, and the adoption of the Internet Protocol Suite by ARPANET and other networks added more potential targets and attackers to the mix. The first “real” malware emerged during this time, as did the public panic around The Cold War. Tools and techniques developed during this era would become common in modern cybersecurity; dictionary attacks used stolen lists of passwords and exploited weak default credentials, while decoy computer systems trapped attackers.
The late 80’s gave two major events.

  • The first was the discovery that a hacker working for the KGB gained access to sensitive documents from the U.S. military.

  • The second was the creation of the world’s truly serious piece of malware: the Morris Worm. It was originally written to map the size of the internet but quickly grew out of control, choking computers with multiple copies of itself, and clogging the network as it kept replicating.

These incidences exploited unsecured default settings; default passwords like “admin” ensured a system or piece of software was easily exploitable.


Download 48.5 Kb.
1   2   3   4




Download 48.5 Kb.

Bosh sahifa
Aloqalar

    Bosh sahifa



The first modern computer, was brought online in 1945, cybersecurity

Download 48.5 Kb.