1 00:00:02,050 --> 00:00:10,180 It's interesting enough to understand the history of cybersecurity because security has come a very 2 00:00:10,180 --> 00:00:17,680 long way over the past half century, starting out as a bit of a practical joke between colleagues back 3 00:00:17,680 --> 00:00:18,970 in the 1960s. 4 00:00:19,270 --> 00:00:26,140 The steady rise of technology in the years that have followed now has made information security a huge 5 00:00:26,140 --> 00:00:26,470 issue. 6 00:00:27,490 --> 00:00:35,500 Even large companies that you may be knowing, like Yahoo, Microsoft and Google, have each been targeted 7 00:00:35,500 --> 00:00:37,660 by hackers in the past decade. 8 00:00:38,230 --> 00:00:46,270 Plus, while cyber safety has improved hugely over the years, we all know one of a very important cyberattack 9 00:00:46,270 --> 00:00:48,160 that is 2017 is one. 10 00:00:48,250 --> 00:00:56,290 A cyberattack proved that it is not just information security that has evolved over the years, but 11 00:00:56,290 --> 00:01:01,780 even hackers and computer viruses have to very 1960s. 12 00:01:01,780 --> 00:01:09,460 It was during the 1960s when organizations first started to become more protective of their information 13 00:01:09,460 --> 00:01:09,970 systems. 14 00:01:09,970 --> 00:01:17,380 They started to think about how they can protect the data, how they can, you know, protect these 15 00:01:17,380 --> 00:01:19,450 systems from external attacks. 16 00:01:20,020 --> 00:01:24,290 During this time, there was no Internet or network to worry about. 17 00:01:24,310 --> 00:01:32,140 So security was largely focused more on physical measures and preventing access to people with enough 18 00:01:32,140 --> 00:01:36,790 knowledge about how to work a computer in order to do this. 19 00:01:37,090 --> 00:01:44,860 In 1960s, passwords and multiple layers of security protection were added to the devices for these 20 00:01:44,860 --> 00:01:50,060 safety measures are also implemented to ensure that the stored data was protected. 21 00:01:51,100 --> 00:01:58,810 After all, there was no iCloud available back in those days, so computers had to be secured by different 22 00:01:58,810 --> 00:01:59,230 means. 23 00:02:00,700 --> 00:02:03,630 1970S saw the crypto program. 24 00:02:04,060 --> 00:02:12,700 Now cybersecurity history began with a research project in the 1970s on what was then known as the ARPANET. 25 00:02:13,240 --> 00:02:17,800 That is the Advanced Research Projects Agency network. 26 00:02:18,350 --> 00:02:26,410 A researcher named Bob Thomas created a computer program which was able to move the app on its network, 27 00:02:26,410 --> 00:02:29,410 leaving a small trail wherever it meant. 28 00:02:30,340 --> 00:02:37,330 He named that program as the Crepeau program because of its printed message that was left like I am 29 00:02:37,330 --> 00:02:42,940 the Crepeau Catch me if you can then read Thomlinson. 30 00:02:42,940 --> 00:02:50,170 That is the man who invented the e-mail later designed the program, which took crypto to the next level, 31 00:02:50,590 --> 00:02:54,620 making it the self replicating and the first ever computer. 32 00:02:55,900 --> 00:03:02,260 Now, Thomas and Danielson's programs may have been designed as a bit of mess around, but again, they 33 00:03:02,260 --> 00:03:08,380 actually served a highly important purpose, revealing a number of laws in the ARPANET. 34 00:03:09,510 --> 00:03:12,040 1980S devoid of Internet. 35 00:03:12,990 --> 00:03:20,040 Now, over the years that followed, computers started to become more and more connected to computer 36 00:03:20,040 --> 00:03:25,350 viruses also became an issue as they also changed to advance technologies. 37 00:03:26,220 --> 00:03:30,690 The Russians, for example, began using cyber power as a weapon. 38 00:03:30,870 --> 00:03:34,350 No offense to Russia, it just the history that I'm telling you. 39 00:03:34,980 --> 00:03:43,560 So when it comes to the Russians, again, along with the Russians, even German computer hacker Marcos 40 00:03:43,560 --> 00:03:47,100 has used to steal the U.S. military secrets. 41 00:03:48,150 --> 00:03:53,160 Two years later, in 1988, the board of the world famous. 42 00:03:53,550 --> 00:03:56,070 Um, Harris. 43 00:03:56,340 --> 00:03:57,390 I'm sorry, Maurice. 44 00:03:57,390 --> 00:03:58,540 What if I'm right? 45 00:03:58,560 --> 00:03:59,570 Um, let me. 46 00:03:59,580 --> 00:04:05,730 Yeah, it's Morris Worm Morris, who was one of the major turning point in the history of information 47 00:04:05,730 --> 00:04:06,360 security. 48 00:04:06,900 --> 00:04:14,850 Network usage began to expand rapidly and more and more universities, militaries and governments became 49 00:04:14,850 --> 00:04:15,680 connected to it. 50 00:04:16,590 --> 00:04:22,800 That meant that the security measures required had to gradually become more expensive as well. 51 00:04:23,580 --> 00:04:30,030 Now, the more one, which is named after its inventor, Robert Morris, the worm was designed to propagate 52 00:04:30,030 --> 00:04:35,970 across network, infiltrate the terminals using a known bug and then copy itself. 53 00:04:36,750 --> 00:04:44,130 However, its ability to self replicate would be to downfall as worms replicated so aggressively that 54 00:04:44,130 --> 00:04:50,070 it rendered the targeted computers inoperable and slowed the Internet to a crawl in peace. 55 00:04:51,520 --> 00:04:58,270 Now, this modest home lead to the formation of computer emergency response team, that is the third 56 00:04:58,540 --> 00:05:01,750 in order to prevent further issues and cyber attacks. 57 00:05:04,490 --> 00:05:13,140 1990S saw the rise of firewall's now with the Internet becoming available to the public, more and more 58 00:05:13,140 --> 00:05:19,410 people began putting their personal information online because of this organized crime. 59 00:05:19,410 --> 00:05:26,820 And he saw this as a potential source of revenue and started to steal data from people and the government 60 00:05:26,910 --> 00:05:27,880 through the Internet. 61 00:05:28,920 --> 00:05:36,630 By the middle of the 90s, network security threats had increased exponentially and firewalls and antivirus 62 00:05:36,630 --> 00:05:41,760 programs had to be produced on a mass basis to protect the public. 63 00:05:42,570 --> 00:05:49,830 It was a NASA researcher who created the very first firewall program following a computer virus attack 64 00:05:49,830 --> 00:05:51,180 at the California base. 65 00:05:52,290 --> 00:05:58,350 The researcher and their team created a virtual firewall, which they modeled on the physical structures 66 00:05:58,350 --> 00:06:02,970 that prevent the spread of actual fires within the buildings or structures. 67 00:06:04,480 --> 00:06:09,210 In 2000, I'm sorry, it's going backwards, OK? 68 00:06:09,430 --> 00:06:16,570 In 2000, security laws were introduced, so governments began to clamp down on the criminality of hacking, 69 00:06:16,840 --> 00:06:20,530 giving much more serious sentences to those hackers. 70 00:06:21,310 --> 00:06:27,730 Information security continued to advanced as the Internet grew, but unfortunately, the viruses were 71 00:06:27,730 --> 00:06:28,360 also growing. 72 00:06:29,050 --> 00:06:33,970 Hackers quickly became able to create viruses that could not, not or not. 73 00:06:33,970 --> 00:06:40,660 They could not only target the specific organizations, but they again targeted the whole cities, states 74 00:06:40,660 --> 00:06:42,490 and even continents as well. 75 00:06:44,030 --> 00:06:47,350 2010 was the era of major breaches. 76 00:06:47,410 --> 00:06:55,640 So in 2013, Edward Snowden, a former CIA employee and a contractor for the U.S. government, copied 77 00:06:55,640 --> 00:06:59,600 and leaked classified information from the National Security Agency. 78 00:06:59,610 --> 00:07:03,490 So that was one major breach in 2014. 79 00:07:03,500 --> 00:07:04,340 The Yahoo! 80 00:07:04,340 --> 00:07:06,950 Incident was very famous. 81 00:07:06,950 --> 00:07:15,330 Yahoo was attacked and the total revenue decreased by around three hundred and fifty million dollars. 82 00:07:15,350 --> 00:07:23,750 If I'm not wrong and 2017 was vulnerable to attack, which is very popular, if you ask anyone about 83 00:07:23,750 --> 00:07:30,230 one of the targets, very famous Volgograd targeted computers running the Microsoft Windows operating 84 00:07:30,230 --> 00:07:34,970 system and demanded ransom payments in the Bitcoin cryptocurrency. 85 00:07:35,450 --> 00:07:45,880 In only one day, the worm infected over 20 to 30 hundred thousand computers across 150 countries. 86 00:07:45,880 --> 00:07:48,270 So and they demanded a huge ransom. 87 00:07:49,880 --> 00:07:56,780 So while each of these data breaches were incredibly severe, thankfully a number of companies exist 88 00:07:56,780 --> 00:07:58,310 to offer solutions. 89 00:07:58,310 --> 00:07:59,700 So it's not at all bad. 90 00:08:00,080 --> 00:08:02,180 It was just a history of security. 91 00:08:03,090 --> 00:08:09,170 However, on a more personal level, it is vital for you to understand why security is important. 92 00:08:09,170 --> 00:08:14,780 And that is why I wanted to give you an overview of history of cybersecurity. 93 00:08:15,860 --> 00:08:24,110 Just imagine yourself in 1990s where there were no security, the people that there were no firewalls 94 00:08:24,110 --> 00:08:26,120 or, you know, people were expert in security. 95 00:08:26,120 --> 00:08:28,970 If you lost something, just consider it's gone. 96 00:08:28,980 --> 00:08:34,460 But today, there are many tools and techniques through which you can even recover the lost files. 97 00:08:35,300 --> 00:08:38,360 So this was the history of cybersecurity. 98 00:08:39,080 --> 00:08:45,050 In the next lecture, we are going to talk about the key items that you need to understand before you 99 00:08:45,050 --> 00:08:45,740 move ahead. 100 00:08:45,740 --> 00:08:48,830 In the course, we're going to discuss a lot of terms. 101 00:08:48,860 --> 00:08:52,060 So stay tuned and keep the momentum going. 102 00:08:52,400 --> 00:08:54,770 I will see you in the next lecture.