History of cyber security
Why cyber security is important
Cyber security attacks that hit news
Everyone should practice cyber security
Significance of Cybersecurity
Significance of Cybersecurity
Cybersecurity entails the protection of programs, networks, and systems from cyber-attacks aimed at accessing unauthorized information, destroying sensitive information, extortion users, and interruption of businesses. This is, however, a difficult task today because the attackers are becoming more innovative. According to Kaspersky lab, in 2016, over 758 million attacks translating to an attack or attempt every 40 seconds. With the figure predicted to supersede $5 trillion in 2021. This is an indicator of the potential of this ransomware that continues to affect a lot of companies and organizations. (Opara, 2016) It, therefore, requires multifaceted layers of protection to curb the attacks. This discourse seeks to highlight the history of cybersecurity and its importance in this era and age.
History of cybersecurity
The history of cybersecurity dates back to decades ago around the 1970s. It began following a research project by Bob Thomas when he discovered the possibility of a computer program to move across a network leaving traces. Thus, he designed the programme to move between Tenex terminals and named it Creeper. Ray Tomlinson saw the program and, through curiosity, self-replicated the programme to form the first computer work. This Creeper’s became the first computer work affecting the computer programme, to counter this work he needed another program to clean it. He then wrote another program, Reaper, to chase Creeper and delete it. Reaper is the first documented antivirus .over time; there has been a lot of computer malware affecting computer soft wares today (Middleton, 2017). Initially, the virus were treated as academic pranks.
In 1988, Robert Morris wrote a programme with the intention to gauge the internet size. However an error occurred.. The Morris worm replicated itself, causing immense damage, which consequentially slowed the internet. The effects were detrimental, making Morris the first person to be charged for cybersecurity breaching under the Computer Fraud and Abuses Act. In addition led to the formation of the computer emergency response team a research center of computer and systemic issues that affect the internet. The Morris worm became the advent of deadlier viruses, leading to the creation of the first antivirus company to fight the viruses. By the early 1990s, a lot of antivirus samples were created amounting to approximately 5000 million samples annually as the number of malwares attacks increased (Middleton, 2017). Today, a lot of company are actively involved in creation of anti-virus soft wares to curb cyber security.
Cyber-attacks that hit the news
Cybersecurity breach is continuously on the rise, growing steadily. With the increase in complexities of these attacks today, the cybersecurity niche continues to be exploited in the search for more efficient protective measures to combat these complexities. Herein are some of the most renowned cyber-attacks that hit the news leaving the companies counting losses in millions of dollars, and notably, a lot of customers globally.
Yahoo data breach
In 2016, Yahoo reported a data breach whereby the company’s account management tool had been breached. The hackers had by passed the user accounts by forcing through cookies that safeguarded their passwords. This damage affected over one billion user accounts, meaning almost all the user accounts had been breached, affecting their other companies such as Tumblr. Following the compromise, the company withheld the information of their breach for three years .this breach made it one of the most significant data breach, costing the company a total of $16 million to combat the breach and restore the user safety (Tarter, 2017).
In 2018, Marriott hotel, one of the largest hotel chains in the world, reported a data breach that whereby the attackers could access use name and their passwords using a combination of remote access Trojan and Mimi Katz. The extent of the damage was great whereby over 500 million customer personal records were stolen, such as the names, passport number, addresses, and more when their user accounts were compromised—they hotel chain $123 million fine over this breach (O’dowd, 2017).
LinkedIn data breach
The breach happened in 2012 as reported by linked in whereby its user’s passwords were exposed, affecting over 6.5 million people. The hackers had recreated passwords adding random data to the users’ password making it difficult for subscribers to access their accounts. It made it even more difficult to retrieve the password (O’dowd, 2017). Henceforth, linked in adoptee salting supplemented by other security measures to protect their users’ passwords.
The Adobe Hack
Adobe suffered a cyber-attack when hackers stole data worth for over 153 million users. This massive hacking took place in October 2013; the data was then disseminated online. To access this private information, the hack, as attributed to a previous in-house security breach, it suffered the loss of their product data in addition to their customer information (O’dowd, 2017). This incident posed the company to cyber security measures to adopt use of strong passwords to safeguard their users data.
The Target hack
Another cyber security attack that hit the news was the Target hack, in December 2013. A malware known as POS had attacked their system stealing payment card details of their customers. An approximate of over 40 million users was affected .the hackers used RAM scrapping technique to read credit card information. the malware attack was not discovered by the brand but rather the American secret service after they had noticed malicious bank operations/ target had to pay over $18 million in compensation for their customers that had had suffered in the event of the attack (Middleton, 2017).
The South Korean breach
South Korea had suffered breach over the year that was reported in January 2014. According to the research the mastermind of the breach was an employee Korea credit bureau. He did this by stealing information of the customers and sold them in the black market to credit traders. In that period, over 100 million crest cards had been stolen. (Middleton, 2017) The owners of the cretic cards were in panic, forcing them to have their credit cards blocked and replaced to secure prevent further breach.
Importance of cyber security
Cyber security is essential since it encompasses everything regarding safeguarding personal information data, intellectual property, and high profile government information from system breach that could lead to harm With the high overreliance on computer and technology today, cyber security is a basic essential. In the event of attacks, it causes detrimental effects to the government, business, or even individuals. Data breach leads to devastating consequences, such as unraveling the company’s business reputation leading to loss of customer and partner trust. In addition, critical data such as intellectual l property jeopardizes the company’s competitive advantage (Opara, 2016). High profile breaches can make headlines causing far much damage, which might take periods to recover; it is, therefore, essential for organizations to adopt and implement strong cybersecurity measures.
Everyone can be a victim of cyber-attacks. Hence the need to implement defensive measures. Everyone must play their role. Being cautious about protecting personal information is something every internet user should prioritize every time they are connected to the internet. Firstly, for parents and guardians, children’s security is imperative. Protecting their children against cyber-attacks could help counter the detrimental effects of cyber-crimes, such as cyberbullying (Tarter, 2017). In addition, protecting family assets such as their photos, videos, and finances. Secondly, for students, the faculties should educate their learners on the importance of cybersecurity. Emphasizing the importance of cybersecurity will reduce vulnerabilities and make the institution a safer environment.
Additionally, for business owners, they are highly susceptible to cyber-attacks. Therefore security awareness and cybersecurity can protect their intellectual property, trade secrets, and curb downtimes that can be caused by malware attacks. Lastly, the government should learn their role in safeguarding high-profile data that could make the government prone to attacks such as terrorism, or loss of revenue due to these malware attacks (Dupuis, 2017). However, cybersecurity starts from an individual role recognizing the types of risk sand implanting protection strategies to minimize or eliminate the possibility of attacks since everyone is predisposed to these attacks.
With the increased technology dependence, it is essential to be informed of the effects of cyber-attacks. Being mindful of the content we access when we are online is one of the most efficient ways to self-protect from cybersecurity attacks. Employing cybersecurity measures, such as the use of strong passwords in electronic devices, the use of antivirus, and regular software updates, helps one stay up to date to combat these attacks easily. Everyone is highly susceptible to cyber-attack security attacks; however, creating awareness reduces the number of cybersecurity attack victims.
Dupuis, M. J. (2017). Cybersecurity for everyone: An introductory course for non-technical majors. Journal of Cybersecurity Education, Research and Practice, 2017(1), 3.
Middleton, B. (2017). A history of cyber security attacks: 1980 to present. CRC Press.
O’dowd, A. (2017). Major global cyber-attack hits NHS and delays treatment.
Opara, E. U., & Mahfouz, A. Y. (2016). Conquering the cyber attacks: analysis and protecting the enterprise resources. International Journal of Business Continuity and Risk Management, 6(4), 314-329
Tarter, A. (2017). Importance of cyber security. In Community Policing-A European Perspective (pp. 213-230). Springer, Cham.