Cybersecurity: A Step Into the Past

Elisabeth Do
Elisabeth Do
calendar icon
December 24, 2023
3 min

From the past to the present, cybersecurity has taken an interesting trip via the growth of technology, emphasizing the ongoing conflict between security measures and cyber attacks. Here's a quick timeline of key events that present the history of cybersecurity:

1940s

  • 1943: The Colossus computers, employed by British codebreakers during World War II, are among the earliest examples of computer technology. They helped understand the German military's Lorenz-encrypted (Tunny) signals.

1950s

  • 1951: The United States military begins to investigate the necessity for safe information transfer, resulting in early concepts in cryptography and secure communication.

1960s

  • 1961: The ARPANET, the predecessor to the contemporary internet, is launched. This presents new issues for safe network communication.
  • 1965: MIT researchers, including Fernando Corbató, created the first computer password for the CTSS. This development was an important step toward securing access to computer systems.
  • 1967: The initial version of the Advanced Research Projects Agency Network (ARPANET) plan is released, laying the groundwork for network security problems.
  • 1969: The ARPANET is launched, resulting in the development of early network protocols that address issues of security and data integrity.

1970s

  • 1971: The Creeper virus, regarded as one of the first computer viruses, emerges. It leads to the development of the first antivirus software, Reaper.
  • 1972: Ray Tomlinson, the inventor of email, modified the Creeper virus to create the first computer worm capable of replicating itself across a network.
  • 1973: The Data Encryption Standard (DES) is the result of the first encryption standards developed by the US Department of Defence.
  • 1974: The Privacy Act of 1974 was passed in the United States, becoming one of the first laws to establish a foundation for data privacy.
  • 1976: Whitfield Diffie and Martin Hellman created public-key cryptography, which revolutionized secure communications by allowing two people to converse securely without sharing a secret.
  • 1977: The National Institute of Standards and Technology (NIST) certified the Data Encryption Standard (DES) as a government standard for encrypting non-classified information.
  • 1979: The first known instance of computer-related theft occurred when a programmer at the New York Telephone Company stole approximately $1 million.

1980s

  • 1980: The United States passed the Computer Fraud and Abuse Act, one of the first laws to combat computer-related crimes.
  • 1983: Fred Cohen created the term "computer virus" to describe self-replicating computer programs.
  • 1984: The Comprehensive Crime Control Act expanded law enforcement organizations' ability to access electronic communications, emphasizing the growing relevance of electronic data.
  • 1986: The Brain, the first known PC virus, infects floppy discs.
  • 1987: The Christmas Tree EXEC worm caused massive disruption on IBM mainframes connected to the BITNET and VNET networks.
  • 1988: The Morris Worm is published, drastically slowing down the internet and alerting the world to network weaknesses.
  • 1989: The notion of antivirus software began to gain popularity, with numerous businesses offering systems designed to identify and remove malware.

1990s

  • 1991: The first version of the Linux kernel is published, which eventually became essential for secure server operations.
  • 1994: Netscape develops SSL (Secure Sockets Layer) encryption, making the internet more secure.
  • 1995: The "Concept Virus" was designed to demonstrate the potential of macro viruses, resulting in a new wave of malware capable of exploiting ordinary software programs.
  • 1996: The United States government develops the National Infrastructure Protection Centre to protect against cyberthreats.
  • 1998: The Internet Corporation for Assigned Names and Numbers (ICANN) was created, and it plays an important role in the management and security of the internet's domain name system.
  • 1999: The Melissa virus, a mass-mailing macrovirus, spread quickly via email, emphasizing the need for better email security and virus scanning procedures.

2000s

  • 2000: The ILOVEYOU virus causes widespread damage, emphasizing the need for improved email security.
  • 2001: Code Red, a computer worm, targeted machines using Microsoft's IIS web server by exploiting a buffer overflow in the system. It signaled a transition to more aggressive network-based attacks.
  • 2002: Major distributed denial of service (DDoS) attack on the internet's domain name system (DNS) hierarchy. The attack targeted seven of the thirteen root name servers, which are critical to internet functionality.
  • 2003: The SQL Slammer worm quickly spreads, infecting thousands of servers in minutes.
  • 2004: The Payment Card Industry Data Security Standard (PCI DSS) was established to regulate credit card security and prevent fraud.
  • 2005: The CardSystems data breach occurred, resulting in the theft of around 40 million credit card details. This incident impacted major credit card firms including MasterCard, Visa, American Express, and Discover.
  • 2006: Cyberstorm I participated in the first Department of Homeland Security (DHS)-sponsored cyber exercise that tested reactions from the private sector and various levels of government, showing the growing awareness and need of coordinated responses to severe cyberthreats.
  • 2007: Estonia confronts a large organized cyberattack, highlighting the reality of cyber warfare.
  • 2008: Elderwood launched Operation Aurora, a series of cyberattacks on Google and numerous other companies. This emphasized the surge in state-sponsored cyber espionage.
  • 2009: The Conficker worm infected millions of computers in over 190 countries, including government, commercial, and residential systems, becoming one of the most widespread worm outbreaks in internet history.

2010s

  • 2010: The Stuxnet worm is discovered. It targeted Iranian nuclear facilities and represented a major change in cyber warfare methods.
  • 2011: The Sony PlayStation Network was hacked, compromising millions of customers' personal information. This incident emphasized the risks associated with data breaches in large businesses.
  • 2012: The data leak at Global Payment Systems was an important cybersecurity occurrence. This event disclosed a hack on one of the top third-party payment system providers, which exposed about 1.5 million accounts.
  • 2013: Edward Snowden's revelations emphasize the scope of government monitoring and the value of data privacy.
  • 2014: The Heartbleed bug exposes flaws in OpenSSL, a popular encryption program.
  • 2015: The U.S. Office of Personnel Management (OPM) announced a huge data breach that exposed personal information about millions of federal employees.
  • 2016: The General Data Protection Regulation (GDPR) is adopted in the EU, setting new standards for data protection.
  • 2017: The WannaCry ransomware attack affects hundreds of thousands of computers worldwide, showing the destructive power of cyberthreats.
  • 2018: The Cambridge Analytica scandal broke, revealing the misuse of personal data from millions of Facebook users for political advertising, raising serious questions about data privacy and security.
  • 2019: A significant ransomware attack on the city of Baltimore's computer networks resulted in the shutdown of essential city services, showcasing the vulnerability of public infrastructure to cyberattacks.

2020s

  • 2020: SolarWinds supply chain attack reveals vulnerabilities in software supply chains.
  • 2021: Increase in ransomware attacks, including high-profile cases like the Colonial Pipeline attack.
  • 2022: Growing concerns over AI-driven attacks and deepfakes, along with enhanced focus on cloud security and IoT vulnerabilities.