Changes

no edit summary
Line 6: Line 6:  
*From the late 1950s through the 1970s, [[Phone Phreaking]] marked the beginning of present-day hacking culture; simple security tools, such as access controls and passwords, were implemented. Then came cryptographic applications, such as public-key cryptography, security verification, cryptographic protocols, and cryptographic hashing.<ref>[https://www.sciencedirect.com/science/article/pii/S0167404817302249?casa_token=deFBX0B2eLMAAAAA:FXPmbrKThtFL1_aSpVTABhyEzhWMiQhyk3wXhXfX5WOewf7FSM9gEHvkYN_TNgqVbn5kJw5pl7Q Hatfield, Joseph.2018. "Social engineering in cybersecurity." ''Computers & Security'', 73:102-113]</ref>  
 
*From the late 1950s through the 1970s, [[Phone Phreaking]] marked the beginning of present-day hacking culture; simple security tools, such as access controls and passwords, were implemented. Then came cryptographic applications, such as public-key cryptography, security verification, cryptographic protocols, and cryptographic hashing.<ref>[https://www.sciencedirect.com/science/article/pii/S0167404817302249?casa_token=deFBX0B2eLMAAAAA:FXPmbrKThtFL1_aSpVTABhyEzhWMiQhyk3wXhXfX5WOewf7FSM9gEHvkYN_TNgqVbn5kJw5pl7Q Hatfield, Joseph.2018. "Social engineering in cybersecurity." ''Computers & Security'', 73:102-113]</ref>  
 
*In 1983, the Massachusetts Institute of Technology was granted the first US patent for a cryptographic communication system.
 
*In 1983, the Massachusetts Institute of Technology was granted the first US patent for a cryptographic communication system.
*By 1990, [[Malware]], malware detection, antivirus techniques, buffer overflow attacks, intrusion detection, and firewalls were in play.<ref>P.J. & D.E. Denning.2016."Cybersecurity is harder than building bridges."Am Sci, 104(3):1-6</ref>
+
*By 1990, [[Malware]], malware detection, antivirus techniques, buffer overflow attacks, intrusion detection, and firewalls were in play.<ref>P.J. & D.E. Denning.2016."Cybersecurity is harder than building bridges."''Am Sci'', 104(3):1-6</ref>
 
*By 2006, automated vigilance had become more-or-less the norm, leading Greiner to call [[Social Engineering Attacks]] "the highest form of hacking."<ref>L. Greiner.2006."
 
*By 2006, automated vigilance had become more-or-less the norm, leading Greiner to call [[Social Engineering Attacks]] "the highest form of hacking."<ref>L. Greiner.2006."
Hacking your network's weakest link – you" Netw Mag, 12(1):9-12</ref>
+
Hacking your network's weakest link – you" ''Netw Mag'', 12(1):9-12</ref>
 
*In the 2010s, cybersecurity went mainstream: most corporations had to say (if not do) something about client privacy and data security.<ref>[https://www.forbes.com/sites/forrester/2019/12/18/decade-retrospective-cybersecurity-from-2010-to-2019/?sh=60d1b05d4d51 Decade Retrospective, Cybersecurity, Forbes]</ref>
 
*In the 2010s, cybersecurity went mainstream: most corporations had to say (if not do) something about client privacy and data security.<ref>[https://www.forbes.com/sites/forrester/2019/12/18/decade-retrospective-cybersecurity-from-2010-to-2019/?sh=60d1b05d4d51 Decade Retrospective, Cybersecurity, Forbes]</ref>
 
*In 2011, researchers at Lockheed Martin standardized cybersecurity jargon with the publication of their white paper, "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains."<ref>[https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf Eric M. Hutchins, Michael J. Cloppert, & Rohan M. Amin.2011."Lockheed Martin Kill Chain.]</ref>
 
*In 2011, researchers at Lockheed Martin standardized cybersecurity jargon with the publication of their white paper, "Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains."<ref>[https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf Eric M. Hutchins, Michael J. Cloppert, & Rohan M. Amin.2011."Lockheed Martin Kill Chain.]</ref>
Bureaucrats, Check users, lookupuser, Administrators, translator
14,932

edits