Table of contents
1.
Introduction
2.
What is Cyber Security?
3.
History
4.
Evolving Cyber Threats
4.1.
The cyber-attack in 1986 by Marcus Hess
4.2.
The cyberattack by Robert Morris
5.
FAQs
6.
Key Takeaways
Last Updated: Mar 27, 2024
Easy

History of Cyber Security

Author SHIKHAR SONI
1 upvote
Career growth poll
Do you think IIT Guwahati certified course can help you in your career?

Introduction

The article discusses and explores the history of cyber security and its evolution. It will help you understand how the need for cyber security developed and how it has since evolved. It will also give you a good idea to understand the need for cyber security how it grew and might evolve further.

What is Cyber Security?

Cyber Security refers to protecting computer systems, networks, data, programs, etc., from cyber attacks (Cyber attacks refer to attempts to steal or corrupt data, disable access of systems to various resources and gain control of a system to launch attacks using it).

History

The story began in 1970. Researcher Bob Thomas created a computer program that came to be known as the "Creeper". The program was not designed with a malicious intent to damage or steal data, but as an experiment and the program worked with the then-popular Tenex operating. It moved between computers connected to the ARPANET and printed the message "I'M THE CREEPER; CATCH ME IF YOU CAN" on the teletype (a device used to send and receive messages in a text format, with a type-writer style input and printed paper output).

The first version of this program moved across the systems, but later Roy Tomlinson made another version that copied itself onto the host computer. This version is now popularly regarded as the first worm.

In response to the "Creeper" program, there was the "Reaper" program that would move across the Arpanet to delete copies of the "Creeper" program, making it effectively the first-ever computer antivirus (anti-worm software).

Also read - active and passive attacks

Evolving Cyber Threats

There have been many more developments in cyber threats made with malicious intentions, unlike the "Creeper", and can cause serious harm to their victims. These developments have been favoured by the rapid expansion of the internet and the huge developments in the hardware and software capabilities of the newer systems.

The incidents after 1970 indicate this well, such as the 1986 cyber-attack by the German hacker Marcus Hess and the other famous cyber attack being the "Morris Worm" developed by Robert Morris in 1988.

The cyber-attack in 1986 by Marcus Hess

The first recorded case of cyber security threat that led to national security concerns in the US was done in 1986-87 by a group the German hacker. They managed to gain information from defence contractors, military bases, pentagons, etc. and tried to sell it to Soviet KGB.

He was, however, caught by the astronomer "Cristoper Stall" before the damage was done.

The cyberattack by Robert Morris

This was a cyber attack to gain a lot of public attention and also a criminal conviction. The purpose behind the attack wasn't malicious. However, it did cause 10% of the inter-connected systems to get knocked from the network. His reason behind the attack was to test the size of the network find and also bring awareness to the security problems on it.

His reasons were noble, but his program ("morris worm") still ended up causing huge disruption and attracting a ton of media coverage.

He was consequently sentenced to 3 years probation and to pay a fine of $10,000 along with 400 hours of community service.

These also later lead to more public awareness with respect to cyber-attacks and the need for cyber security. It's important to realize that a program that could work similarly to the "Morris Worm" can create an unimaginable amount of monetary loss from the current perspective. As such, advancements in cyber security are a requirement for the future as the need for development grows, and so do the cyber security challenges (refer here to know more about cyber security challenges faced by us with the advent of several new technologies).

FAQs

1. Why is Cyber Security Necessary?

Cyber attackers pose a risk to various sensitive information of the users of the affected systems; sensitive information includes PII (Personal Identifiable Information, it can be used to gain information about anonymous users that can help identify them), PHI (Personal Health Information), intellectual property and other extremely sensitive information.

2. What are some common cyber-attacks?

Phishing, DoS (Denial of service attack), Man-in-the-Middle (MitM) attack, SQL injection, malware, etc., are some of the most common types of cyber security attack.

3. What jobs can one aim for in cyber security?

One can pursue jobs such as:

  1. Network Security Engineers
  2. Cybersecurity Analysts
  3. Security Architect
  4. Information Security officer

4. Difference between a cyber attacker and a hacker?

Hackers also refer to the ethical side where the researchers find and inform related organizations about security threats. In contrast, an attacker is the one to gain access to our data and systems for his own benefit, often at the cost of the victim.

5. What is malware?

Malware is a software program that disrupts users' computer security and privacy by damaging, destroying and stealing user data and computer systems. Some examples of malware are viruses, ransomware, spyware and adware.

Key Takeaways

In this article, we have extensively discussed the History of Cyber Security and its evolution over time. I'll recommend learning about multiple ways attackers can attack systems and use their vulnerabilities (learn about it here). Refer here to learn more about future career prospects in cyber security.

Recommended Articles:

Visit the link here for carefully crafted courses on campus placement and interview preparation on coding ninjas.

We hope that this blog has helped you enhance your knowledge regarding Cyber Security and if you would like to learn more, check out our articles here. Do upvote our blog to help other ninjas grow. Happy Coding!

Live masterclass