The History of Information Security: Samonte, Rachelle Ivana H. BSIT-BA-3201
The History of Information Security: Samonte, Rachelle Ivana H. BSIT-BA-3201
The History of Information Security: Samonte, Rachelle Ivana H. BSIT-BA-3201
Information Security
Samonte, Rachelle Ivana H.
BSIT-BA-3201
The history of information security begins with
computer security.
The Rand Report R-609 was the first widely recognized published
document to identify the role of management and policy issues
in computer security.
Wide utilization of networking components in information
systems in the military introduced security risks that could
not be mitigated by the routine practices then used to secure
these systems. This paper signaled a pivotal moment in computer
security history—when the scope of computer security expanded
significantly from the safety of physical locations and
hardware to include the following:
Securing the data
Limiting random and unauthorized access to that data
Involving personnel from multiple levels of the organization
in matters pertaining to information security
MULTICS
• Much of the early research on computer security centered on a system called
Multiplexed Information and Computing Service (MULTICS).noteworthy because it was
the first operating system to integrate security into its core functions. It was a
mainframe, time-sharing operating system developed in the mid1960s by a consortium
of General Electric (GE), Bell Labs, and the Massachusetts Institute of Technology
(MIT).
• At the close of the twentieth century, networks of computers became more common, as
did the need to connect these networks to each other. This gave rise to the
Internet, the first global network of networks. The Internet was made available to
the general public in the 1990s, having previously been the domain of government,
academia, and dedicated industry professionals. The Internet brought connectivity
to virtually all computers that could reach a phone line or an Internet-connected
local area network (LAN). After the Internet was commercialized, the technology
became pervasive, reaching almost every corner of the globe with an expanding array
of uses.
What Is Security?