Introductory Part Part I: Cyber Security. Historical Background Part II: Common Threats Part III: Countermeasures References
Introductory Part Part I: Cyber Security. Historical Background Part II: Common Threats Part III: Countermeasures References
Introductory part
Part I: Cyber security. Historical background
Part II: Common threats
Part III: Countermeasures
Summary
References
Introduction
Computer security, cybersecurity, or information technology security (IT
security) is the protection of computer systems and networks from information
disclosure, theft of, or damage to their hardware, software, or electronic data, as
well as from the disruption or misdirection of the services they provide.
The field has become significant due to the expanded reliance on computer
systems, the Internet, and wireless network standards such as Bluetooth and Wi-
Fi, and due to the growth of "smart" devices, including smartphones, televisions,
and the various devices that constitute the Internet of things (IoT). Cybersecurity
is also one of the significant challenges in the contemporary world, due to its
complexity, both in terms of political usage and technology. Its primary goal is to
ensure the system's dependability, integrity, and data privacy.
Part I: Cyber security. Historical background
Since the Internet's arrival and with the digital transformation initiated in recent
years, the notion of cybersecurity has become a familiar subject in both our
professional and personal lives. Cybersecurity and cyber threats have been
consistently present for the last 50 years of technological change. In the 1970s
and 1980s, computer security was mainly limited to academia until the
conception of the Internet, where, with increased connectivity, computer viruses
and network intrusions began to take off. After the spread of viruses in the 1990s,
the 2000s marked the institutionalization of cyber threats and cybersecurity.
Finally, from the 2010s, large-scale attacks and government regulations started
emerging.
The April 1967 session organized by Willis Ware at the Spring Joint Computer
Conference, and the later publication of the Ware Report, were foundational
moments in the history of the field of computer security. Ware's work straddled
the intersection of material, cultural, political, and social concerns.
A 1977 NIST publication introduced the "CIA triad" of Confidentiality, Integrity,
and Availability as a clear and simple way to describe key security goals. While
still relevant, many more elaborate frameworks have since been proposed.
However, in the 1970s and 1980s there were no grave computer threats because
computers and the internet were still developing, and security threats were easily
identifiable. Most often, threats came from malicious insiders who gained
unauthorized access to sensitive documents and files. Although malware and
network breaches existed during the early years, they did not use them for
financial gain. However, by the second half of the 1970s, established computer
firms like IBM started offering commercial access control systems and computer
security software products.
It started with Creeper in 1971. Creeper was an experimental computer program
written by Bob Thomas at BBN. It is considered the first computer worm.
In 1972, the first anti-virus software was created, called Reaper. It was created by
Ray Tomlinson to move across the ARPANET and delete the Creeper worm.
Between September 1986 and June 1987, a group of German hackers performed
the first documented case of cyber espionage. The group hacked into American
defense contractors, universities, and military bases' networks and sold gathered
information to the Soviet KGB. The group was led by Markus Hess, who was
arrested on 29 June 1987. He was convicted of espionage (along with two co-
conspirators) on 15 Feb 1990.
In 1988, one of the first computer worms, called the Morris worm, was
distributed via the Internet. It gained significant mainstream media attention.
In 1993, Netscape started developing the protocol SSL, shortly after the National
Center for Supercomputing Applications (NCSA) launched Mosaic 1.0, the first
web browser, in 1993. Netscape had SSL version 1.0 ready in 1994, but it was
never released to the public due to many serious security vulnerabilities. These
weaknesses included replay attacks and a vulnerability that allowed hackers to
alter unencrypted communications sent by users. However, in February 1995,
Netscape launched the Version 2.0.
Protecting information systems includes evaluating software, identifying security
flaws, and taking steps to correct the flaws, which is a defensive action.
Collecting intelligence includes exploiting security flaws to extract information,
which is an offensive action.
The agency analyzes commonly used software in order to find security flaws,
which it reserves for offensive purposes against competitors. The agency seldom
takes defensive action by reporting the flaws to software producers so that they
can eliminate them.