Sign In
Not register? Register Now!
Pages:
3 pages/β‰ˆ825 words
Sources:
4 Sources
Style:
APA
Subject:
IT & Computer Science
Type:
Other (Not Listed)
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 16.2
Topic:

White Paper on the History of Cyber Security

Other (Not Listed) Instructions:

White paper
Supporting topic: history/background and context
Supporting idea #1
History of cyber security
Supporting ideas #2
Where it came from and why
Supporting idea #3
Effects on national security

Other (Not Listed) Sample Content Preview:

Cyber Security
Name
Institution
Course Code
Date
History of cyber security
The cyber security industry has grown and evolved since computers were invented. The earliest forms of cyber security came from experimentation and research by later evolved to be used maliciously. Ray Tomlinson, the creator of email, created the first antivirus known as Reaper. It was created to find and destroy the first computer worm, Creeper, created by Robert Thomas, a researcher at BBN Technologies CITATION Vik21 \l 1033 (Davies, 21). While creeper was created as an experiment to demonstrate that programs could be created to attack computers on the ARPANET, Reaper demonstrated that other programs could be created to counter their influence. This compelled the young computing industry to create a new industry to focus on security. This prompted the birth of the antivirus industry. As the cybercriminals and researchers continued to create more effective, complex, and deadlier worms and viruses with greater impact and more undetectable features, there came a need for more sophisticated solutions. The new cyber security industry raced to prevent solutions and preventive measures to prevent attacks. The cyber security industry has evolved with technological advancement to ensure it is always a step ahead of criminals.
Where it came from and why
Cyber security was born out of necessity. Since the inception and widespread of computers, there has been a lurking danger of cybercrime. Some individuals and organizations have continued to find innovative ways to hack into other computers to steal data, cripple operations, and demand ransoms. Today there are many types of cyberattacks, i.e., malware, ransomware, spyware, virus, phishing attacks, denial of service attacks, passwords attacks, SQL injection, etc. All these attacks demand a system to safeguard against cybercriminals. These criminals have prompted the birth and development of the cyber security industry. Cyber security seeks to prevent attacks on personal, corporate, and government digital infrastructure and devices from the aforementioned attacks. The cyber security industry has grown and evolved since computers were invented.
Over the past few decades, since computers and the internet became mainstream, malware has evolved and become complex, and so has the industry seeking to prevent its malicious attacks. Before personal computers became mainstream, antiviruses were the common form of cyber security. However, in the 90s, the internet expanded the opportunity for cybercriminals to exploit computers remotely. The use of antiviruses exploded, and newer tools, i.e., Firewalls, intrusion detection systems, etc. And methods to prevent attacks were created. Newer forms of cybersecurity were also created, i.e., Pen Testing. Pen testing is a simulated attack on personal computer infrastructure to search for vulnerabilities. The vulnerabilities are later fixed to avoid exploitation by cybercriminals. Additionally, cyber security has evolved into training individuals to prevent these attacks. Today, some institutions teach and train individuals on cyber security.
Effects on national security
Cybercrime has become a very lucrative industry. Cybercri...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Other (Not Listed) Samples: