SlideShare uma empresa Scribd logo
1 de 9
network security history
Shahab ali telcom 8th
Network security history
 First time network introduce by ARPANET 1960-70
 ARPANET advance research project agence
Network security definition
 To deliver data from source to destination in a safe way over a network
 Before 90s security were relatively uncommen because internet is limited and
every one knew each other risk and threat is limited
 70s and 80s on internet playing particular jokes with each other
 Popularization of term hacker shows in a movie WAR GAME
Robert Tappan Morris (born November 8, 1965) is an American computer
scientist and entrepreneur. He is best known for creating the Morris Worm in
1988, considered the first computer worm on the Internet.
The first widespread virus for an IBM PC operating system was called Brain in
1983
First virus release in Pakistan know as brain
1988 next cyber attacket by rober moras about 6000 computer disable
Get there data and copy it and earn 10 thousand dollar
First anti virus
 John mcafee 1991 dicoverd antivirus by the name of NORTON
 10 Best Free Antivirus Software | 2017 Edition
 Bitdefender Antivirus Free Edition. ...
 Avira Antivirus. ...
 Avast Free Antivirus. ...
 AVG Free Antivirus. ...
 Kaspersky Lab Internet Security 2017. ...
 Sophos Home Free Antivirus. ...
 Panda Free Antivirus. ...
 Comodo Antivirus.
Famous cyber attacks
 [Solar sunrise 1998] 500 computer system hacked by two California teenager
 Melissa virus 1999 thousand of computer damage and 80 million damage
 Code red warm 2001
 Nimba virus 2001
 Dos attack 2002
 My doom 2004
 So on
 Flame malware 2012
? Increase
 More flate form available
 Mobile phone
 App
 Cloud
 Social media fb twitter etc
 70% hacker from russia
Anonymous?
 Who is the leader of the Anonymous?
 Hector Xavier Monsegur, nicknamed Sabu, was arrested in 2011 and
admitted involvement in hacking companies like MasterCard and PayPal. In
2013, Jeremy Hammond was sentenced to ten years in prison for his
Anonymous hacking. Several other names have been made public, but the
group remains true to their name: anonymous.Jul 29, 201
Network security history

Mais conteúdo relacionado

Mais procurados

The Malware Menace
The Malware MenaceThe Malware Menace
The Malware MenaceTami Brass
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & wormsSourav Verma
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khanTajwar khan
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 
Who's watching you
Who's watching youWho's watching you
Who's watching youTrent Morrow
 
Mobile Apps The Essentials
Mobile Apps  The EssentialsMobile Apps  The Essentials
Mobile Apps The EssentialsGlenn McKnight
 
Computer viruses and criminal internet business
Computer viruses and criminal internet businessComputer viruses and criminal internet business
Computer viruses and criminal internet businessAndrei Kolesnikov
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?cnbweg45
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómezSergioGmezOrtiz
 
Hacking the Invisible Network: What You Don�t See Can Kill You
Hacking the Invisible Network: What You Don�t See Can Kill YouHacking the Invisible Network: What You Don�t See Can Kill You
Hacking the Invisible Network: What You Don�t See Can Kill Youdigitallibrary
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloJohn Intindolo
 

Mais procurados (20)

The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Hackers
HackersHackers
Hackers
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
Mobile security
Mobile securityMobile security
Mobile security
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Who's watching you
Who's watching youWho's watching you
Who's watching you
 
Mobile Apps The Essentials
Mobile Apps  The EssentialsMobile Apps  The Essentials
Mobile Apps The Essentials
 
Computer viruses and criminal internet business
Computer viruses and criminal internet businessComputer viruses and criminal internet business
Computer viruses and criminal internet business
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómez
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Malware
MalwareMalware
Malware
 
Hacking the Invisible Network: What You Don�t See Can Kill You
Hacking the Invisible Network: What You Don�t See Can Kill YouHacking the Invisible Network: What You Don�t See Can Kill You
Hacking the Invisible Network: What You Don�t See Can Kill You
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_Intindolo
 

Semelhante a Network security history

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Information Systems Security: An Overview
Information Systems Security: An OverviewInformation Systems Security: An Overview
Information Systems Security: An OverviewApostolos Syropoulos
 
The History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfThe History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfonline Marketing
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
Top 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultTop 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultSOCVault
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Securitykailash shaw
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 
Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Anthony Arrott
 
CybercrimeWhat is itBrennan (2010) submits that Cyber.docx
CybercrimeWhat is itBrennan (2010) submits that Cyber.docxCybercrimeWhat is itBrennan (2010) submits that Cyber.docx
CybercrimeWhat is itBrennan (2010) submits that Cyber.docxwhittemorelucilla
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail sonykhan3
 

Semelhante a Network security history (20)

Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Information Systems Security: An Overview
Information Systems Security: An OverviewInformation Systems Security: An Overview
Information Systems Security: An Overview
 
The History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfThe History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdf
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Hacking
HackingHacking
Hacking
 
Top 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultTop 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVault
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Timeline of computer viruses
Timeline of computer virusesTimeline of computer viruses
Timeline of computer viruses
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
 
CybercrimeWhat is itBrennan (2010) submits that Cyber.docx
CybercrimeWhat is itBrennan (2010) submits that Cyber.docxCybercrimeWhat is itBrennan (2010) submits that Cyber.docx
CybercrimeWhat is itBrennan (2010) submits that Cyber.docx
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 

Network security history

  • 2. Network security history  First time network introduce by ARPANET 1960-70  ARPANET advance research project agence
  • 3. Network security definition  To deliver data from source to destination in a safe way over a network  Before 90s security were relatively uncommen because internet is limited and every one knew each other risk and threat is limited  70s and 80s on internet playing particular jokes with each other  Popularization of term hacker shows in a movie WAR GAME
  • 4. Robert Tappan Morris (born November 8, 1965) is an American computer scientist and entrepreneur. He is best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet. The first widespread virus for an IBM PC operating system was called Brain in 1983 First virus release in Pakistan know as brain 1988 next cyber attacket by rober moras about 6000 computer disable Get there data and copy it and earn 10 thousand dollar
  • 5. First anti virus  John mcafee 1991 dicoverd antivirus by the name of NORTON  10 Best Free Antivirus Software | 2017 Edition  Bitdefender Antivirus Free Edition. ...  Avira Antivirus. ...  Avast Free Antivirus. ...  AVG Free Antivirus. ...  Kaspersky Lab Internet Security 2017. ...  Sophos Home Free Antivirus. ...  Panda Free Antivirus. ...  Comodo Antivirus.
  • 6. Famous cyber attacks  [Solar sunrise 1998] 500 computer system hacked by two California teenager  Melissa virus 1999 thousand of computer damage and 80 million damage  Code red warm 2001  Nimba virus 2001  Dos attack 2002  My doom 2004  So on  Flame malware 2012
  • 7. ? Increase  More flate form available  Mobile phone  App  Cloud  Social media fb twitter etc  70% hacker from russia
  • 8. Anonymous?  Who is the leader of the Anonymous?  Hector Xavier Monsegur, nicknamed Sabu, was arrested in 2011 and admitted involvement in hacking companies like MasterCard and PayPal. In 2013, Jeremy Hammond was sentenced to ten years in prison for his Anonymous hacking. Several other names have been made public, but the group remains true to their name: anonymous.Jul 29, 201