− | *Phone phreaking from the late 1950s through the early 1970s, which pre-dated the creation of ARPANET, marked the beginning of present-day hacking culture.<ref>[https://www.sciencedirect.com/science/article/pii/S0167404817302249?casa_token=deFBX0B2eLMAAAAA:FXPmbrKThtFL1_aSpVTABhyEzhWMiQhyk3wXhXfX5WOewf7FSM9gEHvkYN_TNgqVbn5kJw5pl7Q Hatfield, Joseph. 2018. "Social engineering in cybersecurity." ''Computers & Security'', 73:102-113]</ref> | + | *Phone phreaking from the late 1950s through the early 1970s, which pre-dated the creation of ARPANET, marked the beginning of present-day hacking culture. Simple security tools, such as access controls and passwords, were implemented. Then came cryptographic applications, such as public-key cryptography, security verification, cryptographic protocols, and cryptographic hashing.<ref>[https://www.sciencedirect.com/science/article/pii/S0167404817302249?casa_token=deFBX0B2eLMAAAAA:FXPmbrKThtFL1_aSpVTABhyEzhWMiQhyk3wXhXfX5WOewf7FSM9gEHvkYN_TNgqVbn5kJw5pl7Q Hatfield, Joseph. 2018. "Social engineering in cybersecurity." ''Computers & Security'', 73:102-113]</ref> |
| + | *By 1990, [[Malware]], malware detection, antivirus techniques, buffer overflow attacks, intrusion detection, and firewalls were in play.<ref>P.J. & D.E. Denning. (2016)."Cybersecurity is harder than building bridges." |