100% found this document useful (1 vote)
69 views13 pages

History of Information Security

Uploaded by

marbenvillaflor4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
69 views13 pages

History of Information Security

Uploaded by

marbenvillaflor4
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Learning Objectives

Upon completion of this material, you should be able to:

§ Understand the definition of information security


§ Comprehend the history of computer security and how it
evolved into information security
§ Understand the key terms and critical concepts of
information security as presented in the chapter
§ Outline the phases of the security systems development
life cycle
§ Understand the roles of professionals involved in
information security within an organization

Principles of Information Security, 2nd Edition 2


Introduction

§ Information security: a “well-informed sense of


assurance that the information risks and controls are in
balance.” —Jim Anderson, Inovant (2002)

§ Necessary to review the origins of this field and its


impact on our understanding of information security
today

Principles of Information Security, 2nd Edition 3


The History of Information Security

§ Began immediately after the first mainframes were


developed

§ Created to aid code-breaking computations during World


War II

§ Physical controls to limit access to sensitive military


locations to authorized personnel: badges, keys, and
facial recognition

§ Rudimentary in defending against physical theft,


espionage, and sabotage

Principles of Information Security, 2nd Edition 4


Figure 1-1 – The Enigma

Principles of Information Security, 2nd Edition 5


The History of Information Security

§ One of 1st documented problems


§ Early 1960s
§ Not physical
§ Accidental file switch
§ Entire password file
§ printed on every output file

Principles of Information Security, 2nd Edition 6


The 1960s

§ Additional mainframes online

§ Advanced Research Procurement Agency (ARPA)


began to examine feasibility of redundant networked
communications

§ Larry Roberts developed ARPANET from its inception

§ ARPANET is the first Internet

Principles of Information Security, 2nd Edition 7


Figure 1-2 - ARPANET

Principles of Information Security, 2nd Edition 8


The 1970s and 80s

§ ARPANET grew in popularity as did its potential for misuse

§ Fundamental problems with ARPANET security were


identified

§ No safety procedures for dial-up connections to ARPANET

§ Non-existent user identification and authorization to system

Principles of Information Security, 2nd Edition 9


R-609

§ Information security began with Rand Report R-609 (paper


that started the study of computer security)
§ Scope of computer security grew from physical security to
include:
§ Safety of data
§ Limiting unauthorized access to data
§ Involvement of personnel from multiple levels of an
organization
§ First identified role of management and policy

Principles of Information Security, 2nd Edition 10


The History of Information Security
§ Multics
§ Operating System
§ Security primary goal
§ Didn’t go very far
§ Several developers created Unix
§ Late 1970s: microprocessor expanded computing
capabilities and security threats
§ From mainframe to PC
§ Decentralized computing
§ Need for sharing resources increased
§ Major changed computing

Principles of Information Security, 2nd Edition 11


The 1990s

§ Networks of computers became more common; so too


did the need to interconnect networks

§ Internet became first manifestation of a global network of


networks

§ In early Internet deployments, security was treated as a


low priority

§ Many of the problems that plague e-mail on the Internet are the
result to this early lack of security

Principles of Information Security, 2nd Edition 12


The Present

§ The Internet brings millions of computer networks into


communication with each other—many of them
unsecured

§ Ability to secure a computer’s data influenced by the


security of every computer to which it is connected

Principles of Information Security, 2nd Edition 13

You might also like