Cyber Timeline


Definition 

Cyber Security refers to the processes, technology, and practices designed to protect devices, networks, programs and data from attacks, damage and unauthorised access.

The Importance

To be brief, Cyber Security has been seen as a major risk as early as 2013 by intelligence officials and has been mentioned as a rising risk years beforehand. This blog will detail Cyber Security Risks and guide you on how to protect yourself from them.

Cyber Timeline


1970’s
Rootkits
A software that enables unauthorised users to gain control of a device without detection was created. The most famous use is in 2005 regarding Sony CD.






1978
Spam
The first spam email was sent during 1978 using the ARPANET (this was one of the foundation blocks for today’s internet). Today the distribution of spam email is on various different channels and on a whole new level of mass distribution. 




1982
Viruses
The first virus (Elk Cloner) was created by a high school student Rich Skenta, he used a floppy disk to spread his virus through unknowing users who started up their devices using infected inserts (Floppies, CD, DVD or USB).




1988
Worms
The first worm to be created was Morris Worm, which obviously took the name from its creator Robert Morris, who is now one of the most famous hackers in the world. The Morris Worm's purpose was to measure the size of the internet, however, the infection had a flaw in which infected computers were rendered unusable.




1989
Trojan Horse Software
The trojan horse is a malicious programme which misleads users of its true purpose. It was first claimed to be a database of AIDs information which was sent to AIDs Researchers. The actual year is still debated (89 or 87).





1990’s
Prankware
Prankware, which later evolves into Crimeware in the 90’s, worked when you opened an infected email, the software created a draft email which could be used to extort, steal data , or spam.



1996
Phishing
Created to trick users to give their personal details by mimicking a website etc.






2003
Botnets
The SoBig email worm is regarded as the first attempt to create large-scale botnets. Botnets are private computers with malicious software and controlled by hackers e.g. to send out spam emails.



2011
APT (Advanced Persistent Threat)
This is an attack with the sole purpose to gain unauthorised access and stay there undetected to steal data to then cause damage. 







Stay tuned for more detailed posts on how to keep yourself private and up-to-date with Cyber Security 😊

Sources

Timeline
Definition



Comments

Popular Posts