0% found this document useful (0 votes)
5 views1 page

Lac 1 (Introduction To Information Security)

The document provides an overview of the history and evolution of information security, detailing key developments from the 1960s to the 2010s, including the introduction of password protection, the rise of the internet, and the emergence of significant cybersecurity threats. It also outlines the importance of information security in protecting sensitive data, ensuring compliance with regulations, and maintaining business continuity. The document emphasizes the need for multiple layers of security to mitigate risks associated with cyber threats.

Uploaded by

mr.sajjadov
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views1 page

Lac 1 (Introduction To Information Security)

The document provides an overview of the history and evolution of information security, detailing key developments from the 1960s to the 2010s, including the introduction of password protection, the rise of the internet, and the emergence of significant cybersecurity threats. It also outlines the importance of information security in protecting sensitive data, ensuring compliance with regulations, and maintaining business continuity. The document emphasizes the need for multiple layers of security to mitigate risks associated with cyber threats.

Uploaded by

mr.sajjadov
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Lac 1 (Introduction to Information Security)

Data
Information
Unorganized
Organized
Data vs
Needs Processed Information Needs Processing
useful
Useless
Contextual Raw

History of Information Security

Evolution of Password Protection The Evolution of Cybersecurity in


in the 1960s the 1970s

When did organizations


start to protect their What was the first
computers? computer program related
to cybersecurity?

In the 1960s.
The first program was
called ‘CREEPER’, created
by Bob Thomas.
What was the focus of
security during that time?
What did CREEPER do?

Security was focused on


physical measures and CREEPER moved across
restricting access to the ARPANET, leaving a
knowledgeable individuals. trail and displaying the
message: ‘I’M THE
CREEPER: CATCH ME IF
YOU CAN’.

Who enhanced CREEPER


and how?

The Rise of the Internet in the


1980s Ray Tomlinson enhanced
CREEPER by making it
self-replicating, creating
the first computer worm.

What was the solution to


CREEPER?
What happened to the
ARPANET in the 1980s?
Tomlinson wrote a
program called Reaper,
which chased and deleted
It became known as the
CREEPER, marking the first
internet and was made
antivirus software.
public as the worldwide
web in 1989.

How did computer


connectivity change during
this time?

Computers became
The Rise of Firewalls in the 1990s
increasingly connected,
and computer viruses
evolved.

How did cyberpower


emerge as a weapon?
What led to the creation of
firewalls in the 1990s?
In 1986, Russians used
hacker Marcus Hess to
steal US military secrets, Network security threats
hacking over 400 military increased exponentially,
computers, including necessitating mass
those at the Pentagon. production of firewalls and
antivirus programs.

Who created the first


firewall program?

Proper punishment A NASA researcher


designed the first firewall
in the 2000s program after a computer
virus attack at their
California base.

How did hacking


punishments change
from the 1980s to the Breaches from 2010s to 2017s
2000s?

In the early 2000s,


governments
imposed much
harsher penalties, 2010s: The Era of
including extensive Major Breaches
jail time and large
fines, compared to
the lighter sentences Due to the consistent
of the 1980s, which rise of technology,
included warnings hacking became ever
and probation. more complicated
over the years that
followed, and a
number of major data
breaches now largely
define the era.

What was the


significance of
Edward Snowden's
actions in 2013?

Snowden leaked
classified NSA
information, revealing
government
surveillance on the
public.

What happened with


Yahoo between 2013
and 2014?

Hackers
compromised
Yahoo, affecting
three billion users,
leading to a $35
million fine and a
$350 million drop in
sale price.

What was WannaCry


in 2017?

WannaCry was the


first 'ransom worm'
that infected over
230,000 computers
worldwide,
demanding ransom
in Bitcoin.

What is security?

The quality or state of being secure—to be free from danger. To


ensure the well-being of an organization, it is crucial to establish
multiple layers of security.

Endpoint Security Cloud Security

Antivirus Software Data Encryption


Device Management Access Control

Physical Security Personal Security

Access Control Background Checks


Surveillance Systems Training Programs

Security
Communication Security Operational Security

Encryption Risk Management


Secure Protocols Policy Enforcement

Network Security Information Security

Firewalls Data Encryption


Intrusion Detection Access Management

Protecting Sensitive Information Mitigating Risk

Data Encryption Risk Assessment


Access Controls Incident Response
Purposes of
Information
Protecting Reputation Compliance with Regulations
Security
Public Relations Regulatory Audits
Customer Trust Policy Implementation

Ensuring Business Continuity

Disaster Recovery
Continuity Planning

Information security helps protect sensitive


information from being accessed, disclosed,
Protecting or modified by unauthorized individuals.
Sensitive
Information This includes personal information, financial
data, and trade secrets, as well as confidential
government and military information

By implementing information security


measures, organizations can mitigate the risks
associated with cyber threats and other
security incidents.
Mitigating Risk
This includes minimizing the risk of data
breaches, denial-of-service attacks, and other
malicious activities.

Many industries and jurisdictions have


specific regulations governing the protection
of sensitive information.
Compliance with
Regulations
Information security measures help ensure
compliance with these regulations, reducing
the risk of fines and legal liability

Security breaches can damage an


organization’s reputation and lead to lost
business
Protecting
Reputation
Effective information security can help
protect an organization’s reputation by
minimizing the risk of security incidents

Information security helps


ensure that critical business
functions can continue even in
Ensuring
the event of a security incident.
business
This includes maintaining
continuity
access to key systems and
data, and minimizing the
impact of any disruptions.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy