[go: up one dir, main page]

0% found this document useful (0 votes)
7 views6 pages

Unit - 1

The document outlines the evolution of information security, beginning with computer security during World War II and the development of ARPANET, which laid the foundation for the modern Internet. It highlights the progression of security measures from physical security to various layers including personal, operational, communications, and network security. The current state reveals millions of unsecured computers interconnected, emphasizing the importance of security in a networked environment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views6 pages

Unit - 1

The document outlines the evolution of information security, beginning with computer security during World War II and the development of ARPANET, which laid the foundation for the modern Internet. It highlights the progression of security measures from physical security to various layers including personal, operational, communications, and network security. The current state reveals millions of unsecured computers interconnected, emphasizing the importance of security in a networked environment.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Unit – 1

Introduction
Information security
• Begins with computer security.
• Unless a computer wants to be connected/ open to other computers.
• Began during World War II.
• Defense Advanced Research Project Agency (ARPA) – started to check the
feasibility of a communication system.
• ARPANET was formed – basic of today’s Internet.
• Larry Robert’s – founder of internet.
• In the next decade, ARPANET grew in popularity, so did its security.
• In Dec, 1973 – fundamental problems with ARPANET security was
identified.
• In 1978, report for this was submitted.
Information security
• Started with security of physical location .
• The scope was to improve,
• Safety of data.
• Limiting random unauthorised access to data.
• Involvement of personnel from multiple levels of the organization.
• Most research focused on MULTICS (Multiplexed Information and Computing
Service).
• MULTICS – OS developed with security as the primary goal.
• Soon, UNIX was developed.
• In late 1970s, microprocessor was developed.
• This decentralized computers.
• In 1980s, personal computer users wanted to connect their computers to
In 1990s
• Networks of computers became common.
• Internet – network of networks started.
• This started becoming public and reached the corner of the world.
• This was first used in military and then became commercialized.
• Security was least concerned.
• The lag in security systems these days was mainly due to negligence of
security in earlier stages.
Present
• Millions of unsecured computers are connected together.
• The security of a computer depends on the security of the other computer to
which it is connected.
Security
• “the quality or state of being secure – to be free from danger”
• Layers of security:
• Physical security – addresses security of physical items, objects or areas of an
organization
• Personal security – protection of an individual or group of individual who are authorized
to access the organization.
• Operations security – protection of the operation or a group of activities.
• Communications security – protection of communication of an organization.
• Network security – protection of networking components, connections.
• Information security

You might also like