Preview

History of Information Security

Better Essays
Open Document
Open Document
1233 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
History of Information Security
Abstract
The 21st century has brought with it the reliance of powerful, networked computers to run businesses. With this reliance has come vulnerabilities to information and a need for information security. In order to understand the history and development of research being performed today with information security, it is important to have background knowledge of the internet and networking, its vulnerabilities, attack methods through the internet, and security technology are all important. This essay briefly provides a short history of networks and how they connect to the internet. It also gives brief history of threats against networks and follows with the history of technology created to combat those threats.
History and Development of Information Security The 21st century has brought with it the reliance of powerful, networked computers to run businesses. These networks hold databases which store such information as contact information, personal histories, financial records, and official identifiers such as Social Security numbers. This wealth of information allows businesses and government to operate more efficiently but also exposes the persons to whom the information relates to risks such as identity theft, monetary losses, loss of intellectual property, loss of privacy and reputations, stalking, and blackmail (Villiers, 2010, p. 24). Following is a brief history of information security. In 1946 the first computer, the Electronic Numerical Integrator and Calculator, was developed by the U.S. Army. Today we have Microcomputers, minicomputers, mainframe computers, and supercomputers. The microcomputer became known as the personal computers in the 1980’s. These machines are small enough to sit on a desk or be portable as in a laptop. Minicomputers are more powerful than personal computers and are most often found in mid-sized businesses. Mainframes are systems are capable of great processing speed however are very expensive and require a



References: Meiring de, V. s. (n.d). Information security standards and liability. Journal of Internet Law, 13(7), 24. Fischer, R.J., Halibozek, E., Green G. (2008). Introduction to security (8th Ed.) Oxford, UK: Elsevier Inc. Mallard S. (2010). The history behind network security. From brighthub.com website: http://www.brighthub.com/computing/smb-security/articles/4779.aspx#ixzz1EQfKQCzB Academictutorials.com. (2011). Firewalls tutorial. From Academictutorials.com website: http://www.academictutorials.com/firewalls/firewalls-tutorial.asp Evsslcertificate.com. (2011). History of SSL. From Evsslcertificate.com website: http://www.evsslcertificate.com/ssl/ssl-history.html Ecommerce.hostip.info. (2011). Digital certificate. From Evsslcertificate.com website: http://ecommerce.hostip.info/pages/314/Digital-Certificate.html Sans.org. (2011). The history and evolution of intrusion detection. From sans.org website: http://www.sans.org/reading_room/whitepapers/detection/history-evolution-intrusion-detection_344 Daya B. (nd). Network security: history, importance, and future. From web.mit.edu website: http://web.mit.edu/~bdaya/www/Network%20Security.pdf

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    From this book I take back lot of things related to computers, networks, the government, information security and its importance, and how to handle things under pressure and stress. There are many characters who teach us how to look at situations which actually shows us a way to solve the problem.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    The advancement in network technology has led to its share of security risks. Attacks against networks, user’s personal information and corporate information have changed how the world deals with network security. The idea of Network Security is no longer an afterthought but the driving force in all network designs. IT managers are now concerned with securing data, ensuring only authorized end users have access to resources, and protecting the integrity of hardware, software and devices.…

    • 522 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    ISS Information Systems Information NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 5…

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    The internet is approximately 40 years old and is continuing to grow at a rapid pace. This rapid growth and use of the internet for practically everything you can do in life has also cause a major increase in threats. Cyber-criminals are often breaking into security on many major websites and making the news. Information Security is turning into an important part in protect a business’s information.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Final: Security and Network

    • 3275 Words
    • 11 Pages

    This examination is worth 20 percent of your total grade. There are five questions, and the maximum point values are included with each question.…

    • 3275 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2011). Readings and cases in information security: Law and ethics. Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Stallings, W., & Brown, L. (2012) Computer security: Principles and practice (2nd ed.). Boston, MA: Pearson.…

    • 1167 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Kim, D. , & Solomon, M. (2012). Fundamentals of Information Systems Security. Sudbury, MA: Jones & Bartlett Learning.…

    • 1443 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Global technology is on the rise and being used by many on a daily basis. Companies all around the world are using technology, as well as individuals for personal use. With the rise of global technology comes the increase of cyber crimes and cyber-related threats. With so much personal information available online criminals are finding it easier than ever to access it.…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    3. Conklin, W., & White, G. (2010). Principles of Computer Security (2nd ed.). Chicago, IL: McGraw-Hill.…

    • 1124 Words
    • 5 Pages
    Better Essays