The 21st century has brought with it the reliance of powerful, networked computers to run businesses. With this reliance has come vulnerabilities to information and a need for information security. In order to understand the history and development of research being performed today with information security, it is important to have background knowledge of the internet and networking, its vulnerabilities, attack methods through the internet, and security technology are all important. This essay briefly provides a short history of networks and how they connect to the internet. It also gives brief history of threats against networks and follows with the history of technology created to combat those threats. History and Development of Information Security
The 21st century has brought with it the reliance of powerful, networked computers to run businesses. These networks hold databases which store such information as contact information, personal histories, financial records, and official identifiers such as Social Security numbers. This wealth of information allows businesses and government to operate more efficiently but also exposes the persons to whom the information relates to risks such as identity theft, monetary losses, loss of intellectual property, loss of privacy and reputations, stalking, and blackmail (Villiers, 2010, p. 24). Following is a brief history of information security.
In 1946 the first computer, the Electronic Numerical Integrator and Calculator, was developed by the U.S. Army. Today we have Microcomputers, minicomputers, mainframe computers, and supercomputers. The microcomputer became known as the personal computers in the 1980’s. These machines are small enough to sit on a desk or be portable as in a laptop. Minicomputers are more powerful than personal computers and are most often found in mid-sized businesses. Mainframes are systems are capable of great processing speed however are very expensive and require a...
References: Meiring de, V. s. (n.d). Information security standards and liability. Journal of Internet Law, 13(7), 24.
Fischer, R.J., Halibozek, E., Green G. (2008). Introduction to security (8th Ed.) Oxford, UK: Elsevier Inc.
Mallard S. (2010). The history behind network security. From brighthub.com website: http://www.brighthub.com/computing/smb-security/articles/4779.aspx#ixzz1EQfKQCzB
Academictutorials.com. (2011). Firewalls tutorial. From Academictutorials.com website: http://www.academictutorials.com/firewalls/firewalls-tutorial.asp
Evsslcertificate.com. (2011). History of SSL. From Evsslcertificate.com website: http://www.evsslcertificate.com/ssl/ssl-history.html
Ecommerce.hostip.info. (2011). Digital certificate. From Evsslcertificate.com website: http://ecommerce.hostip.info/pages/314/Digital-Certificate.html
Sans.org. (2011). The history and evolution of intrusion detection. From sans.org website: http://www.sans.org/reading_room/whitepapers/detection/history-evolution-intrusion-detection_344
Daya B. (nd). Network security: history, importance, and future. From web.mit.edu website: http://web.mit.edu/~bdaya/www/Network%20Security.pdf
Please join StudyMode to read the full document