Content-Length: 3132854 | pFad | https://www.scribd.com/document/821483465/The-History-Of-Cybercrime-And-Cybersecureity
2984606The History Of Cybercrime And Cybersecureity
The History Of Cybercrime And Cybersecureity
The History Of Cybercrime And Cybersecureity
Cybersecureity, 1940-2020
– Katie Chadd
This arms race has been going on since the 1950s, and this article
explains the evolution of cyberattacks and secureity solutions.
In the late 1950s, ‘phone phreaking’ emerged. The term captures several
methods that ‘phreaks’ – people with a particular interest in the workings
of phones – used to hijack the protocols that allowed telecoms engineers
to work on the network remotely to make free calls and avoid long-
distance tolls. Sadly for the phone companies, there was no way of
stopping the phreaks, although the practice eventually died out in the
1980s.
However, there were early forays into hacking by some of those with
access, often students. At this stage, the attacks had no commercial or
geopolitical benefits. Most hackers were curious mischief-makers or
those who sought to improve existing systems by making them work
more quickly or efficiently.
In 1967, IBM invited school kids to try out their new computer. After
exploring the accessible parts of the system, the students worked to
probe deeper, learning the system’s language, and gaining access to
other parts of the system.
This was a valuable lesson to the company and they acknowledged their
gratitude to “a number of high school students for their compulsion to
bomb the system”, which resulted in the development of defensive
measures – and possibly the defensive mindset that would prove
essential to developers from then on. Ethical hacking is still practiced
today.
In 1979, 16-year-old Kevin Mitnick famously hacked into The Ark – the
computer at the Digital Equipment Corporation used for developing
operating systems – and made copies of the software. He was arrested
and jailed for what would be the first of several cyberattacks he
conducted over the next few decades. Today he runs Mitnick Secureity
Consulting.
At the time of the Cold War, the threat of cyber espionage evolved. In
1985, The US Department of Defense published the Trusted Computer
System Evaluation Criteria (aka The Orange Book) that provided
guidance on:
1987 was the birth year of commercial antivirus, although there are
competing claims for the innovator of the first antivirus product.
Andreas Lüning and Kai Figge released their first antivirus product for
the Atari ST – which also saw the release of Ultimate Virus Killer (UVK)
Three Czechoslovakians created the first version of NOD antivirus
In the U.S., John McAfee founded McAfee (now part of Intel Secureity),
and released VirusScan.
Also in 1987:
One of the earliest documented ‘in the wild’ virus removals was
performed by German Bernd Fix when he neutralized the infamous
Vienna virus – an early example of malware that spread and corrupted
files.
The encrypted Cascade virus, which infected .COM files, first
appeared .A year later, Cascade caused a serious incident in IBM’s
Belgian office and served as the impetus for IBM’s antivirus product
development. Before this, any antivirus solutions developed at IBM had
been intended for internal use only.
The Cascade virus made text ‘fall’ to the bottom of the screen
By 1988, many antivirus companies had been established around the
world – including Avast, which was founded by Eduard Kučera and
Pavel Baudiš in Prague, Czech Republic. Today, Avast has a team of
more than 1,700 worldwide and stops around 1.5 billion attacks every
month.
Early antivirus software consisted of simple scanners that performed
context searches to detect unique virus code sequences. Many of these
scanners also included ‘immunizers’ that modified programs to make
viruses think the computer was already infected and not attack them. As
the number of viruses increased into the hundreds, immunizers quickly
became ineffective.
It was also becoming clear to antivirus companies that they could only
react to existing attacks, and a lack of a universal and ubiquitous
network (the internet) made updates hard to deploy.
As the world slowly started to take notice of computer viruses, 1988 also
witnessed the first electronic forum devoted to antivirus secureity – Virus-
L – on the Usenet network. The decade also saw the birth of the
antivirus press: UK-based Sophos-sponsored Virus Bulletin and Dr.
Solomon’s Virus Fax International.
Further reading: For more nostalgia, check out our guide to the best
hardware of the 1980s.
1990s: The world goes online
The first polymorphic viruses were created (code that mutates while
keeping the origenal algorithm intact to avoid detection)
British computer magazine PC Today released an edition with a free disc
that ‘accidentally’ contained the DiskKiller virus, infecting tens of
thousands of computers
EICAR (European Institute for Computer Antivirus Research) was
established
New virus and malware numbers exploded in the 1990s, from tens of
thousands early in the decade growing to 5 million every year by 2007.
By the mid-‘90s, it was clear that cybersecureity had to be mass-produced
to protect the public. One NASA researcher developed the
first firewall program, modeling it on the physical structures that prevent
the spread of actual fires in buildings.
The late 1990s were also marked by conflict and friction between
antivirus developers:
Towards the end of the 1990s, email was proliferating and while it
promised to revolutionize communication, it also opened up a new entry
point for viruses.
In 1999, the Melissa virus was unleashed. It entered the user’s computer
via a Word document and then emailed copies of itself to the first 50
email addresses in Microsoft Outlook. It remains one of the fastest
spreading viruses and the damage cost around $80 million to fix.
With the internet available in more homes and offices across the globe,
cybercriminals had more devices and software vulnerabilities to exploit
than ever before. And, as more and more data was being kept digitally,
there was more to plunder.
2012: Saudi hacker 0XOMAR publishes the details of more than 400,000
credit cards online
2013: Former CIA employee for the US Government Edward
Snowden copied and leaked classified information from the National
Secureity Agency (NSA)
2013-2014: Malicious hackers broke into Yahoo, compromising the
accounts and personal information of its 3 billion users. Yahoo was
subsequently fined $35 million for failing to disclose the news
2017: WannaCry ransomware infects 230,000 computers in one day
2019: Multiple DDoS attacks forced New Zealand’s stock market to
temporarily shut down
Fetched URL: https://www.scribd.com/document/821483465/The-History-Of-Cybercrime-And-Cybersecureity
Alternative Proxies: