CHAPTER 1

BRIEF HISTORY AND MISSION OF INFORMATION SYSTEM SECURITY

Seymour Bosworth and Robert V. Jacobson

1.1 INTRODUCTION TO INFORMATION SYSTEM SECURITY

1.2 EVOLUTION OF INFORMATION SYSTEMS

1.2.1 1950s: Punched-Card Systems

1.2.2 Large-Scale Computers

1.2.3 Medium-Size Computers

1.2.4 1960s: Small-Scale Computers

1.2.5 Transistors and Core Memory

1.2.6 Time Sharing

1.2.7 Real-Time, Online Systems

1.2.8 A Family of Computers

1.2.9 1970s: Microprocessors, Networks, and Worms

1.2.10 First Personal Computers

1.2.11 First Network

1.2.12 Further Security Considerations

1.2.13 First “Worm.”

1.2.14 1980s: Productivity Enhancements

1.2.15 Personal Computer

1.2.16 Local Area Networks

1.2.17 1990s: Total Interconnection

1.2.18 Telecommuting

1.2.19 Internet and the World Wide Web

1.3 GOVERNMENT RECOGNITION OF INFORMATION ASSURANCE

1.3.1 IA Standards

1.3.2 Computers at Risk

1.3.3 InfraGard

1.4 RECENT DEVELOPMENTS

1.5 ONGOING MISSION FOR INFORMATION SYSTEM SECURITY

1.6 NOTES

1.1 INTRODUCTION TO INFORMATION SYSTEM SECURITY.

The growth of computers and of information technology has been explosive. Never before has an entirely new technology been propagated around the world with such speed and with so great a penetration of virtually every human activity. Computers have brought vast benefits to fields as diverse as human genome studies, space exploration, artificial intelligence, and a host of applications from the trivial to the most life-enhancing.

Unfortunately, there is also a dark side to ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.