From the dawn of the net to the present age, if you explain the history of "Internet security" in an easy-to-understand manner



For more than half a century since the advent of ideas to become the prototype of the Internet in 1960, most people now have smartphones, accessible all over the world with a few taps, etc. from the dawn of the Internet I have developed enough to be unpredictable. With such expansion of the Internet, cyber crime is increasing online, but from the dawn of the Internet to the present age, the Washington Post summarizes how the Internet security has evolved , Problems of the Internet in modern times are pointed out.

A history of Internet security - Washington Post
http://www.washingtonpost.com/graphics/national/security-of-the-internet/history/

◆ 1960: Proposal of "Distributed Communication Network"
American computer scientistPaul BalinIn 1960, he devised a distributed communication network with a large amount of redundant links and submitted a report as a recoverable system even if the US was subjected to a nuclear attack. Although it is the theory that it can respond to sudden blackouts etc. by dispersing the connection, it was said "at the time it is not realistic". It is a content that foresees the modern internet and leads to the idea of ​​"packet communication" which will appear later.

◆ 1968: Packet Switching Theory
At the same time as Mr. Paul Balin, we arrived at the same theory as "Distributed Communication Network", a British computer scientistDonald DavisMr. In order to make communication more efficient, he proposed to divide the data into small pieces, and we called the data divided into small pieces as "packet". By sharing packet switched lines by multiple users, fewer computing resources can be used more efficiently "Packet switching theoryIs a modern Internet technologyPacket communicationIt is the basis of.

◆ 1969: Origin of the Internet
It is the agency of the US Department of Defense (Pentagon)National Defense Advanced Research Projects Bureau(DARPA) is the world's first packet communications network "ARPANET(ARPANET) "and funded it. ARPANET's first message is a pioneer in networking technologyLeonardo KleinrockIt was sent by Mr. at 22:30 on October 29, 1969.


◆ 1973: early warning
Later hardware firm3Com(3Com) to establishRobert MetcalfMr. Warned in 1973 that the intrusion into ARPANET was too easy, some of the actual intruders pointed out that there were those who were high school students at the time.

◆ 1978: TCP / IP protocol suite
Called one of the "fathers of the Internet"Vinton SurfWith Mr.Robert KahnMr,TCP(Transmission control protocol) andIP(Internet Protocol) encryption technology "TCP / IP(Internet Protocol Suite) "in the Internet. Although the two protocols are standard in modern times, the two scientists later decided to be pursued by the NSA exposure problem.

◆ 1983: The birth of the Internet
In 1983 ARPANET created a worldwide network standard that allows users to communicate via TCP / IP. "Internet" that allows users around the world to easily communicate with each other through the network was born at this time. The standardization of the means by which devices connected to the network can communicate with each other has become standardized, and immeasurable growth of the Internet will start to move.

◆ 1986: Establishment of "Computer Misconduct Prevention Act"
The US Congress enacted a bill in 1986 that provides legal sanctions against computer-related criminal acts such as data theft and unauthorized network access. In addition, crackdown on similar crime in Japan "Unauthorized Computer Access Prohibition ActThat was enforced in 2000.

◆ 1988: "Morris worm" disabled several thousand machines
I went to Cornell University graduate schoolRobert T. MorrisMr. Takahashi tens of thousands of computers worldwide earlyInternet worm(Malware) has spread to spread it is known. From the person's name "Morris worm(Morris Worm) ", infected 60 thousand devices connected to the Internet at that time, 10% of which had crashed several thousand units. Mr. Morris became the first convicted person by the newly established computer fraud prevention law.


◆ 1993: Give courage to people (Power to the People)
World's first browser "NCSA MosaicBy publishing it, even users without special skillsWorld Wide WebYou can now access. A large scale growth of the Internet advanced at this point. Meanwhile, with the increase in the Internet population, the commercialization of cyberspace began and the threat of Internet security by hackers became full-fledged.

◆ 1996: Web animation
With the advent of new drawing tools such as Flash, animation tools and web extensions, the web browser dramatically expanded its functionality. Web browserLook and feelA revolution happened, but hackers immediately realized that these tools can remotely control computers connected to the Internet. Even now Flash and browser extensions are the main cause of security flaws and multiple experts recommend disabling all tools.

◆ 2000: Diffusion of "love letters"
It was discovered in 2000ILOVEYOU(LOVELETTER) ", a wide variety of Internet worms are spread over the net. Software offered by major companies like Microsoft also got vulnerable and in 2000 it was said that tens of millions of people 's computers were infected with viruses and worms.

ByMarty

◆ 2003: Worldwide consolidation of the Internet
The Internet has penetrated all over the world and it exceeds the total amount of data that human beings have generated on the net by 2003 alone, only by the data generated in 2003. Although the Internet is becoming a center of commerce and culture, it also becomes a factor to increase hackers aiming at profit from the Internet.

ByDonkeyHotey

◆ 2007: Internet in pocket
Apple released the first iPhone in 2007, and Google released the first Android smartphone the following year, the demand for mobile devices accelerated. People started to carry small computers packed with personal information, so the era in which police and spies, eventually jealous lovers, are expected to be monitored from every direction began. In addition, the increase in the type of net-connected equipment implies not only the increase of entrances attacked by hackers but also makes it difficult to inspect all systems.

ByNicolas Nova

◆ 2010: Internet enters into unpredictable dimensions
According to the 2010 report of the scientists group called "JASON" in the advisory group of the Pentagon, "the universe spreading on the net is complicated so much that no one can understand it any more, nobody foresees that situation I can not do it because events that go beyond human understanding can not be explained well to anyone. " JASON warns that "what we need to achieve breakthrough in Internet security is the full understanding of cyber security science."

◆ 2014: Automobile hacking
Apple'sCarPlayAnd, Google'sGoogle AutoThe technology for automobiles such as automotive technology is being put to practical use. Certain security researchers reveal how to hack automobiles against the vulnerability of automotive electronics. In the near future it is also said that wireless technology is introduced in all cars sold in the market and vulnerabilities are discovered that bring about hacking and invasion of privacy.

Microsoft Word - car_hacking.docx - car_hacking.pdf
http://illmatics.com/car_hacking.pdf

in Note, Posted by darkhorse_log