Principal of Information System Security : History
Information security (IS) is designed to protect the confidentiality, integrity and availability of data from those with malicious intentions of misusing that data in many manners. These are set of techniques used for managing the tools and policies to prevent and detect information stored in digital or non-digital media.
It is often confused with Cyber security but Information Security (IS) is a crucial part of Cyber security, but it refers exclusively to the processes designed for data security. Cyber security is a more general term that includes Information Security as crucial part of itself.
History of Information Security:
These days, information plays an important role in day to day lives of every individual, whether it be a high profile businessman to being a small shop owner. Information is generated in different forms from being their smartphones to their transaction receipts and buying patterns.This presents a wealth of opportunities for people to steal data; that is why information security is a necessity. But how has information security evolved over the years? Let’s take a look at the history of information security and how it evolved on the course of this duration.
1960s: Offline sites security:
The Information Security was limited to the access points where computers were stored, as they used to be large in sizes and required a huge area to be stored and operated. Multiple layers of security were installed over terminals in form of passwords and other security measures.
1970s: Evolution of personal computer and hackers:
At this time there was no massive global network connecting every device that wanted to be connected. Only large organizations, especially governments, were starting to link computers via telephone lines and peoples started to seek different ways to intercept the information flowing through those telephone lines in order to steal the data and these group of peoples became the first hackers.
1980s: Evolution of cyber-crime:
Hacking and other forms of cyber crimes skyrocketed in this decade with people finding different ways to break into the computer systems and being no strict regulation against the hackers it was a booming craze for the youth. Many government & Military groups wee on the receiving end of these crimes with loss of over millions of dollars from U.S. Banks and in response to this the government started pursuing the hackers.
1990s: “Hacking” becoming an organized crime:
After the worldwide web was made available in 1989, people started putting their personal information online; hackers saw this as a potential revenue source, and started to steal data from people and governments via the web. Firewalls and antivirus programs helped protect against this, but the web was a mostly unsecured with hackers finding different ways to infiltrate the targets devices.
2000s: Cybercrime becoming a serious issue:
Hacking wasn’t considered as serious issues in late 80’s but with evolution of hacking and their dangers governments started chasing the cyber criminals. Strong measures were taken against cyber criminals, hackers were jailed for years as punishment for cyber criminal activity and cyber security cells were formed in order to deal with the issues involving any form of cyber crime.
2010s: Information security as we know it:
Although different measures in form of firewalls and antivirus were designed to protect the devices from attacks but hackers who were efficient and skilled enough were able to breach the systems anyway. Different cryptographic algorithms and encryption techniques are being used in order to protect the data over network and other transmission mediums. Different organizations also implement security policies to avoid human errors of breaching the data in different ways. Software and antivirus programs are installed on PC’s to protect them from the outside attacks.
With time as the internet and devices surrounding the internet evolved, the threat to the information security also found many ways to breach into them. Information security plays a major role in day to day life of every person and organizations.
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.