ebook img

A Visual History of Cybersecurity PDF

56 Pages·2020·18.089 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview A Visual History of Cybersecurity

ILoveYou! A Future is looking Cloud-y VISUAL HISTORY 1970 2020 OF CYBERSECURITY “Catch me if you can!” INTRODUCTION 01 - 02 03 - 10 1970-1979 1980-1989 11 - 20 1990-1999 21 - 30 2000-2009 31 - 46 2010-2019 47 - 74 75 - 84 2020 PREDICTIONS 85 - 98 99 - 102 OPTIV INSIGHTS A VISUAL HISTORY OF CYBERSECURITY From the invention of ARPAnet in 1968, to the rise of personal computing in the 1980’s and telecommuting in the 21st century, this book examines the technological history that brought us here today. Cybercrime has evolved at a breakneck pace alongside the digital advancements of the past five decades, and cybersecurity and cyber professionals have been forced to adapt to a market of nonstop growth. We hope this book provides a compelling visual snapshot of the history that led the cyber industry to where it is, along with our bold predictions for the future. To start, lets take a trip back to 1970... 1 A Visual History of Cybersecurity IINNTTRROODDUUCCTTIIOONN 1970 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 2 KEEP ON HACKIN’ KEEP ON HACKIN’ 100110010 3 A Visual History of Cybersecurity INTRODUCTION 11997700 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 4 Don’t Fear the Reaper 1970 Soon aŸer the first virus, codenamed NEVADA UofU ARPANET, the precursor to “Creeper,” came the first anti-virus, appropriately named “Reaper.”3 UTAH the modern Internet, releases SRI the Network Control Protocol (NCP) allowing computers at C A remote locations to transfer LI F files between computers.2 O “I’m Creeper, the R NI first ever computer UCSB A ARIZONA 1970 virus! Catch me if UCLA Funky Fact The first computer virus is created you can.” The first four by Bob Thomas as a non- computer network malicious program that moves nodes in ARPANET through computers displaying the were all universities.2 message, "I am the Creeper, catch me if you can."3 0 Shakey the robot, the first artificially intelligent 7 mobile robot, is featured in National Geographic as an example of the future possibilities of computers. 9 Receiving computer commands via radio link, Shakey used a TV camera, laser range finder and bump sensors 1 to collect data.1 “I was inducted into Carnegie Mellon University's Robot Hall of Fame in 2004 ALSO 1970 alongside my robo-buds ASIMO and C-3PO.” Published in 1970 and declassified in 1975, the 82-page Ware Report was authored by computer science legend S1234o wwwwuwwwwrcwwwwe....satldahii.tgesrocirtioba.cnletovr.meeendr/sdusahs.ta.aicouko/nenm.yce//os;c tm2o/0fm/a2hsp0ocu wint-iantthgine/g-ciy-nebtveeorrnslucetuti-orwintya--sc1-yb9bo7e0rrns-m-efcreoummrito-yt-/hwea-raer-preanpeotr-tt/o ;- t2h0e1-6internet-68072 ; 2016 Wevaerrey R ceypboerrst:e cAu r19it7y0 t mhreemato w the afta coeu ttolidnaeyd. WotThuhietlelolyiisrn'r eeWetd ina cwroaewhl awa vntee dwar hyke inrrseee tastehlsa.4eemsn .i lnTa hrngeee trlwyep oorrkts . 5 A Visual History of Cybersecurity INTRODUCTION 11997700 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 6 1971 APRIL FOOLS 1976 Steve Jobs and Steve Wozniak launch the 1975 John Draper legendarily discovers a Apple I personal computer method to unlock free long distance on April Fool's Day, with a calls using a 2600 hertz frequency single circut board.3 tone produced by a toy whistle found in Cap’n Crunch cereal boxes. This "phreaker" subculture fostered influential digital visionaries like Paul Allen and Bill Gates, two Jobs and Wozniak, who were once friends, form their own phone phreakers themselves.1 1971 software company, Microsoft.1 The "floppy disk" is invented by Alan Shugart and a team of IBM IBM 5100 engineers, allowing data to be $19,975 shared among computers.2 $20,000 COST OF PERSONAL COMPUTERS IN THE 1970S Commodore $1,000 PET $110,105 Kenbak-1 $795 in 2020 $750 $800 PHREAKERS TRS-80 $4,421 Altair $4,171 $595 in 2020 $600 $565 in 2020 $3,309 $3,142 in 2020 in 2020 $400 UNITE $200 Sources 1 www.tripwire.com/state-of-security/security-data-protection/cyber-security/the-evolution-of-hacking/ ; 2016 2 www.livescience.com/20718-computer-history.html ; 2017 3 www.worldsciencefestival.com/infographics/a_history_of_computer_science/ 7 A Visual History of Cybersecurity INTRODUCTION 11997700 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 8 1976 1979 INSIDER ATTACK XEROX PALO ALTO Greg Chung of Boeing commits one of the worst RESEARCH CENTER cybersecurity breaches in history, sending $2 billion At the Xerox Palo Alto Research Center, worth of stolen documents to China. John Shoch and Jon Hupp create a small program that searches a network for computers with idle processor time, The binders contained thousands of the first worm. documents, including many design manuals related to U.S. military aircraft—the B-1 bomber, the C-17 military cargo plane, the F-15 fighter jet, and the Chinook 47 and 48 helicopters.1 Ironically, the first worms were intended to provide more efficient It was like walking into King Solomon’s mine.1 use of computers. 2006 The FBI begins their investigation into Chung’s Worms demonstrated a capacity possible espionage involvement. for invading any computer on a network, creating the security threat that continues with viruses today.2 2010 Chung is sentenced to 15 years for hoarding and Sources sharing sensitive information. 1 www.newyorker.com/magazine/2014/05/05/a-new-kind-of-spy ; 2014 2 www.technovelgy.com/ct/content.asp?Bnum=190 9 A Visual History of Cybersecurity INTRODUCTION 11997700 1980 1990 2000 2010 2020 PREDICTIONS INSIGHTS 10 PERSON O F YEAR THE THE COMPUTER MOVES IN 11 A Visual History of Cybersecurity INTRODUCTION 1970 11998800 1990 2000 2010 2020 PREDICTIONS INSIGHTS 12 FUN FACT The popular video arcade game "Pac-Man" is released in 1980. The original Japanese title of Puck Man was changed to Pac-Man for international releases as a 1980 preventative measure against defacement of the IBM ignites the arcade machines by personal computer changing the P to an F. market and 1981 revolutionizes business computing with The first video game magazine widespread industry in the U.S. is founded and called adoption. Formerly Electronic Games. AŒer rapid known as the IBM Model success during its first two 5150, their first PC used years, it faltered during the 1983 MicrosoŒ's MS-DOS Video Game Crash and ceased operating system and a publication in 1985.1 4.77 MHz Intel 8088 1982 microprocessor.1 The U.S. reprograms computer equipment that was being purchased through a front company for a Soviet gas pipeline. This proto-cyberaƒack There causes the pipeline Commodore's VIC-20 home to explode.2 computer becomes a less expensive alternative to their initial PET PC and is the first PC to sell more than one million units. Star Trek star William Shatner appeared in she blows their advertisments.1 Sources 1 www.computerhistory.org/timeline/1980/ ; 2020 2 www.gcn.com/Articles/2013/05/30/GCN30-Timeline-Cyber- security.aspx?Page=1http://gcn.com/Articles/2013/05/30/ GCN30-Timeline-Cybersecurity.aspx?Page=1 ; 2013 13 A Visual History of Cybersecurity INTRODUCTION 1970 11998800 1990 2000 2010 2020 PREDICTIONS INSIGHTS 14 INTERIOR PAGES 1984 DOUBLE DISASTER The Swiss company The Chernobyl 1986 "Swatch" introduces nuclear reactor their watches and explodes in the USSR. Apple’s iconic "1984" they become a fashion craze. The Space Shu(cid:7)le commercial airs on Markus Hess and his Challenger disaster January 22, 1984 during accomplices are arrested takes place when the Super Bowl XVIII. in West Germany for space shu(cid:7)le Apple introduces the hacking into the Lawrence disintegrates a(cid:3)er Macintosh.1 Berkeley National being launched, Laboratory and selling killing all on board. stolen information to the KGB, but only receive suspended sentences.3 LIVE AREA LIVE AREA 5 7 8 8 9 9 1 1 President Reagan signs Microso(cid:25) releases the Computer Security Windows-1.2 Act of 1987 to protect the computer data of federal agencies.1 Sources 1 www.computerhistory.org/timeline/1984/ ; 2020 2 www.worldsciencefestival.com/infographics/a_history_of_computer_science/ 3 www.washingtonpost.com/archive/politics/1989/08/17/computer-hackers-face-spy-charges/ cad42e6b-73db-48d4-814f-86eb1574ae68/ ; 1989 15 A Visual History of Cybersecurity INTRODUCTION 1970 11998800 1990 2000 2010 2020 PREDICTIONS INSIGHTS 16

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.