Computer security began immediately after the first mainframes were developed
Groups developing code-breaking computations during World War II created the first modern computers
Physical controls were needed to limit access to authorized personnel to sensitive military locations
Only rudimentary controls were available to defend against physical theft, espionage, and sabotage
An Enigma machine is a famous encryption machine used by the Germans during WWII to transmit coded messages.
Department of Defense’s Advanced Research Project Agency (ARPA) began examining the feasibility of a redundant networked communications
1960s
ARPANET grew in popularity as did its potential for misuse
Fundamental problems with ARPANET security were identified
No safety procedures for dial-up connections to the ARPANET
User identification and authorization to the system were non-existent
In the late ____ the microprocessor expanded computing capabilities and security threats
1970s to 1980s
Networks of computers became more common, so too did the need to interconnect the networks
Resulted in the Internet, the first manifestation of a global network of networks
In early Internet deployments, security was treated as a low priority
1990s
The Internet has brought millions of computer networks into communication with each other – many of them unsecured
Ability to secure each now influenced by the security on every computer to which it is connected
The Present
“The quality or state of being secure--to be free from danger”
Security
To be protected from adversaries
Security
A successful organization should have multiple layers of security in place:
Physical security
Personal security
Operations security
Communications security
Network security
The protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information
Information Security
Tools, such as policy, awareness, training, education, and technology are necessary
Information Security
The C.I.A. triangle was the standard based on confidentiality, integrity, and availability
is a model designed to guide policies for information security within an organization.
CIA Triad
The information is safe from accidental or international disclosure
Confidentiality
The information is safe from accidental or international modification or alteration
Integrity
The information is available to authorized users when needed.
Availability
Information security, therefore, is the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information.