How Has Cybercrime Evolved? A Brief History of Cyberattacks

SOURCE: Make Use Of

Summary

This article’s brief overview of cybercrime, starting with early examples of cyberattacks in the 1970s to the present day, helps us have a better understanding of how hacking has evolved, how data security technology and practices have developed along with it, and how critical it is for us to stay up-to-date on cybersecurity measures for our protection. The article highlights how the development of new technologies has made cybersecurity more complex, and covers the importance of the CIA triad principles in protecting against cybercrime. It also emphasizes the importance of information security and the role of IT security engineers in protecting from unauthorized access, particularly with the rise of the Internet of Things (IoT).

Excerpt

“Worms appeared in the late 1980s. The name of this first worm is the Morris worm, named after its developer, Robert Morris. This wasn’t made for any malicious purpose; instead, it was developed to gauge the size of the internet. However, huge financial losses occurred as a result, amounting to tens of billions of dollars. Morris unintentionally became one of the most famous hackers.”

SHARE: