Who is the Father of Cyber Security?

20-May-2022

The first time cyber security took shape was the invention made by Bob Thomas and since then, the field of cyber security has come far since its invention. The level of risk today is significantly higher and much more significant in number. Bob  Thomas is considered the father of cyber security as it is through his invention that cyber security took to evolve. 

History of Cyber Security

Let us look back at the history of cyber security and learn how the field has evolved with time.

It all began in the 1970s with the creation of a computer program by researcher Bob Thomas. A computer softer Creeper was created by Bob Thomas that has the caliber to move about throughout the ARPANET network, leaving a breadcrumb trail anywhere it goes. The creator of email Ray Tomlinson also created Reaper, which is a program that tracked down and erased Creeper. Reaper was the first self-replicating program and the first computer worm and is the first example of antivirus software. 

The arrival of the commercial antivirus  

Although there were competing claims about who invented the first antivirus product, 1987 was the birth year of commercial antivirus. In 1987, Andreas Lüning and Kai Figge launched their first antivirus program for the Atari ST, along with Ultimate Virus Killer. In the same year, three Czechoslovaks released the initial version of the NOD antivirus, and John McAfee started McAfee and released VirusScan in the United States.

The Global Online Presence

With the wider accessibility and availability of the internet ensued an increasing number of people sharing personal information online. Organized crime groups viewed this as a possible source of profit and began stealing data from individuals and governments via the internet. By the middle of the 1990s, network security threats had grown tremendously, necessitating the mass production of firewalls and antivirus software to protect the public.

Multiplication and Diversification of Threats in the 2000s

In the early 2000s, organized crime began to heavily fund professional cyberattacks, while governments began to crack down on hacking's criminality, handing down far harsher terms to those found guilty. As the internet evolved, so did information security, but viruses grew as well.

The Future Generation: 

The cybersecurity industry is developing at breakneck speed. According to Statista, the global cybersecurity market will be worth $345.4 billion by 2026. Ransomware is one of the most common dangers to a company's data security, and its prevalence is expected to grow.

Now that we have briefly outlined the history of cyber security, let us delve into the cyber threat landscape and learn about the few top cybersecurity threats. 

Top Cybersecurity Threats

Phishing

Phishing attacks are the most dangerous, damaging, and prevalent threat to businesses of all sizes and particularly to small businesses. A phishing attack is executed by the attacker posing as a reliable contact and coaxing the victim to click on a link or download a file that is malicious, or to provide sensitive information like passwords or account details. In recent years, phishing attempts have become much more sophisticated, with attackers becoming more convincing in their impersonation of actual business connections. 

Malware 

Malware is another threat that causes hazards to businesses spanning a wide range of cyber dangers,  which include trojans and viruses. Malware is the harmful codes created by hackers in the attempt to gain access to networks, damage systems or data on systems, or steal them. Typically malware gets proliferated by harmful website downloads,  connecting to infected systems or gadgets, or spam emails. 

Ransomware

Ransomware is a type of cyber-attack that affects hundreds of organizations each year. Because they are one of the most lucrative types of attacks, they have only grown in popularity. Ransomware encrypts company data so that it cannot be used or accessed, and then demands that the organization pay a ransom to get the data back. 

Cloud Security Flaws

The more data is stored in the cloud, the greater the chance of a big data breach. Cloud services are susceptible to a variety of security threats. Account hijacking and Denial of Service (DoS) assaults, for example, block firms from accessing their data. Because they use cloud security technology, many firms assume they are safe. Technology, in actuality, is only a part of the solution. Because no technology can remove vulnerabilities, comprehensive protection is required. As part of a comprehensive cyber risk management plan, insurance is a crucial component of that protection.

Become a Certified Ethical Hacker and advance into the field of cyber security. The term "certified ethical hacker" was coined to describe someone with the necessary hacking skills but a moral code that prohibited them from engaging in unlawful activity. The term ethical hacker has evolved to cover all security experts who offer offensive services. The Certified Ethical Hacker (CEH) credential is without a doubt the most well-known of the EC-Council credentials. It was designed to demonstrate that the bearer understands how to look for security flaws and vulnerabilities in computer systems, as well as how to use the hostile hacking software.

Related Blog Posts:

History of Cyber Security

Top Cybersecurity Threats in 2022

Starting Your Career As Certified Ethical Hacker

Top Cyber Security Jobs in India

What Jobs Can You Get In Cyber Security?

Which Country is best for Cyber Security Jobs?

How Much Does Entry-Level Cyber Security Jobs Pay?

Is there any government job for cyber security in India?

Cybersecurity as a Career Choice and Its Scope

Is Cybersecurity A High-Demand Job?

Cyber Security Career In 2022: Is it Worth It, and Why?

Cyber Security Salary for Beginners and Experienced Professional

How Does the Government of India Hire Cyber Security Experts?

Is Cyber Security A Good Career Choice?

Is Cyber Security an Entry-Level Job?

What Does A Cyber Security Professional Do?

Can You Get A Job In Cyber Security with A Certificate?

Can I Get Into Cybersecurity Without A Degree?

What Is Cloud Cyber Security?

Advantages and disadvantages of Internet Security

Advantages and Disadvantages of Network Security

What are the Advantages and Disadvantages of Cyber Security?

Post a Comment

Submit
Top