Changes

Line 4: Line 4:     
==History==
 
==History==
*Phone phreaking from the late 1950s through the early 1970s, which pre-dated the creation of ARPANET, marked the beginning of present-day hacking culture.<ref>[https://www.sciencedirect.com/science/article/pii/S0167404817302249?casa_token=deFBX0B2eLMAAAAA:FXPmbrKThtFL1_aSpVTABhyEzhWMiQhyk3wXhXfX5WOewf7FSM9gEHvkYN_TNgqVbn5kJw5pl7Q Hatfield, Joseph. 2018. "Social engineering in cybersecurity." ''Computers & Security'', 73:102-113]</ref>  
+
*Phone phreaking from the late 1950s through the early 1970s, which pre-dated the creation of ARPANET, marked the beginning of present-day hacking culture. Simple security tools, such as access controls and passwords, were implemented. Then came cryptographic applications, such as public-key cryptography, security verification, cryptographic protocols, and cryptographic hashing.<ref>[https://www.sciencedirect.com/science/article/pii/S0167404817302249?casa_token=deFBX0B2eLMAAAAA:FXPmbrKThtFL1_aSpVTABhyEzhWMiQhyk3wXhXfX5WOewf7FSM9gEHvkYN_TNgqVbn5kJw5pl7Q Hatfield, Joseph. 2018. "Social engineering in cybersecurity." ''Computers & Security'', 73:102-113]</ref>  
 
*The Massachusetts Institute of Technology was granted the first US patent for a cryptographic communication system in 1983.
 
*The Massachusetts Institute of Technology was granted the first US patent for a cryptographic communication system in 1983.
 +
*By 1990, [[Malware]], malware detection, antivirus techniques, buffer overflow attacks, intrusion detection, and firewalls were in play.<ref>P.J. & D.E. Denning. (2016)."Cybersecurity is harder than building bridges."
 +
Am Sci, 104(3):1-6</ref>
    
==Government Involvement==
 
==Government Involvement==
Bureaucrats, Check users, lookupuser, Administrators, translator
14,952

edits