Chapter 5Cybersecurity Essentials for ICS

Introduction

In 1982, a 15-year-old high school student named Rich Skrenta wrote the first known computer virus. Originally a joke, the virus was loaded on to a floppy disk and inserted into a friend's Apple II computer. It was attached to a game and designed to launch the 50th time the game was started. It then changed to a blank screen that displayed a poem. This was just the beginning. From there, the virus was placed into the computer's memory, which would then be copied over to uninfected floppy disks whenever they were inserted.

From this seemingly innocent start, the computer virus was born. A slightly malicious intent was all that was needed. Although the virus wasn't designed to cause damage, the desire to prank ...

Get Practical Industrial Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.