History of Information Security

Topics: Information security, Computer network, Security Pages: 4 (1233 words) Published: February 2, 2013
The 21st century has brought with it the reliance of powerful, networked computers to run businesses. With this reliance has come vulnerabilities to information and a need for information security. In order to understand the history and development of research being performed today with information security, it is important to have background knowledge of the internet and networking, its vulnerabilities, attack methods through the internet, and security technology are all important. This essay briefly provides a short history of networks and how they connect to the internet. It also gives brief history of threats against networks and follows with the history of technology created to combat those threats.  History and Development of Information Security

The 21st century has brought with it the reliance of powerful, networked computers to run businesses. These networks hold databases which store such information as contact information, personal histories, financial records, and official identifiers such as Social Security numbers. This wealth of information allows businesses and government to operate more efficiently but also exposes the persons to whom the information relates to risks such as identity theft, monetary losses, loss of intellectual property, loss of privacy and reputations, stalking, and blackmail (Villiers, 2010, p. 24). Following is a brief history of information security.

In 1946 the first computer, the Electronic Numerical Integrator and Calculator, was developed by the U.S. Army. Today we have Microcomputers, minicomputers, mainframe computers, and supercomputers. The microcomputer became known as the personal computers in the 1980’s. These machines are small enough to sit on a desk or be portable as in a laptop. Minicomputers are more powerful than personal computers and are most often found in mid-sized businesses. Mainframes are systems are capable of great processing speed however are very expensive and require a...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Information Security Essay
  • Essay about Information Security
  • Information Security Essay
  • Information Security Essay
  • Information Systems Security and Control Essay
  • Information Security Essay
  • Comparisons of Information Security Management Frameworks Essay
  • Essay on information security management

Become a StudyMode Member

Sign Up - It's Free