SlideShare une entreprise Scribd logo
1  sur  9
network security history
Shahab ali telcom 8th
Network security history
 First time network introduce by ARPANET 1960-70
 ARPANET advance research project agence
Network security definition
 To deliver data from source to destination in a safe way over a network
 Before 90s security were relatively uncommen because internet is limited and
every one knew each other risk and threat is limited
 70s and 80s on internet playing particular jokes with each other
 Popularization of term hacker shows in a movie WAR GAME
Robert Tappan Morris (born November 8, 1965) is an American computer
scientist and entrepreneur. He is best known for creating the Morris Worm in
1988, considered the first computer worm on the Internet.
The first widespread virus for an IBM PC operating system was called Brain in
1983
First virus release in Pakistan know as brain
1988 next cyber attacket by rober moras about 6000 computer disable
Get there data and copy it and earn 10 thousand dollar
First anti virus
 John mcafee 1991 dicoverd antivirus by the name of NORTON
 10 Best Free Antivirus Software | 2017 Edition
 Bitdefender Antivirus Free Edition. ...
 Avira Antivirus. ...
 Avast Free Antivirus. ...
 AVG Free Antivirus. ...
 Kaspersky Lab Internet Security 2017. ...
 Sophos Home Free Antivirus. ...
 Panda Free Antivirus. ...
 Comodo Antivirus.
Famous cyber attacks
 [Solar sunrise 1998] 500 computer system hacked by two California teenager
 Melissa virus 1999 thousand of computer damage and 80 million damage
 Code red warm 2001
 Nimba virus 2001
 Dos attack 2002
 My doom 2004
 So on
 Flame malware 2012
? Increase
 More flate form available
 Mobile phone
 App
 Cloud
 Social media fb twitter etc
 70% hacker from russia
Anonymous?
 Who is the leader of the Anonymous?
 Hector Xavier Monsegur, nicknamed Sabu, was arrested in 2011 and
admitted involvement in hacking companies like MasterCard and PayPal. In
2013, Jeremy Hammond was sentenced to ten years in prison for his
Anonymous hacking. Several other names have been made public, but the
group remains true to their name: anonymous.Jul 29, 201
Network security history

Contenu connexe

Tendances

The Malware Menace
The Malware MenaceThe Malware Menace
The Malware MenaceTami Brass
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & wormsSourav Verma
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khanTajwar khan
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Securityguestc03f28
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsJimmy Shah
 
Who's watching you
Who's watching youWho's watching you
Who's watching youTrent Morrow
 
Mobile Apps The Essentials
Mobile Apps  The EssentialsMobile Apps  The Essentials
Mobile Apps The EssentialsGlenn McKnight
 
Computer viruses and criminal internet business
Computer viruses and criminal internet businessComputer viruses and criminal internet business
Computer viruses and criminal internet businessAndrei Kolesnikov
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?cnbweg45
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómezSergioGmezOrtiz
 
Hacking the Invisible Network: What You Don�t See Can Kill You
Hacking the Invisible Network: What You Don�t See Can Kill YouHacking the Invisible Network: What You Don�t See Can Kill You
Hacking the Invisible Network: What You Don�t See Can Kill Youdigitallibrary
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloJohn Intindolo
 

Tendances (20)

The Malware Menace
The Malware MenaceThe Malware Menace
The Malware Menace
 
Hackers
HackersHackers
Hackers
 
Mobile virus & worms
Mobile virus & wormsMobile virus & worms
Mobile virus & worms
 
Mobile security by Tajwar khan
Mobile security by Tajwar khanMobile security by Tajwar khan
Mobile security by Tajwar khan
 
Mobile security
Mobile securityMobile security
Mobile security
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Cell Phone Viruses & Security
Cell Phone Viruses & SecurityCell Phone Viruses & Security
Cell Phone Viruses & Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 
Who's watching you
Who's watching youWho's watching you
Who's watching you
 
Mobile Apps The Essentials
Mobile Apps  The EssentialsMobile Apps  The Essentials
Mobile Apps The Essentials
 
Computer viruses and criminal internet business
Computer viruses and criminal internet businessComputer viruses and criminal internet business
Computer viruses and criminal internet business
 
What is Spyware?
What is Spyware?What is Spyware?
What is Spyware?
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómez
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Malware
MalwareMalware
Malware
 
Hacking the Invisible Network: What You Don�t See Can Kill You
Hacking the Invisible Network: What You Don�t See Can Kill YouHacking the Invisible Network: What You Don�t See Can Kill You
Hacking the Invisible Network: What You Don�t See Can Kill You
 
ISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_IntindoloISSC456_Project_Presentation_Intindolo
ISSC456_Project_Presentation_Intindolo
 

Similaire à Network security history

Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Information Systems Security: An Overview
Information Systems Security: An OverviewInformation Systems Security: An Overview
Information Systems Security: An OverviewApostolos Syropoulos
 
The History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfThe History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfonline Marketing
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrimeravikanthh
 
Top 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultTop 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultSOCVault
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Securitykailash shaw
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Umang Patel
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus Ammy Vijay
 
Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Anthony Arrott
 
CybercrimeWhat is itBrennan (2010) submits that Cyber.docx
CybercrimeWhat is itBrennan (2010) submits that Cyber.docxCybercrimeWhat is itBrennan (2010) submits that Cyber.docx
CybercrimeWhat is itBrennan (2010) submits that Cyber.docxwhittemorelucilla
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A DiscussionKaushik Patra
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail sonykhan3
 

Similaire à Network security history (20)

Historyofviruses
HistoryofvirusesHistoryofviruses
Historyofviruses
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Information Systems Security: An Overview
Information Systems Security: An OverviewInformation Systems Security: An Overview
Information Systems Security: An Overview
 
The History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdfThe History of Cybersecurity - Servnet.pdf
The History of Cybersecurity - Servnet.pdf
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Hacking
HackingHacking
Hacking
 
Top 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVaultTop 5 Famous Cyberattacks Of The World | SOCVault
Top 5 Famous Cyberattacks Of The World | SOCVault
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006Ethical hacking presentation_october_2006
Ethical hacking presentation_october_2006
 
Timeline of computer viruses
Timeline of computer virusesTimeline of computer viruses
Timeline of computer viruses
 
History of Computer Virus
History of Computer Virus History of Computer Virus
History of Computer Virus
 
Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020Arrott Htcia St Johns 101020
Arrott Htcia St Johns 101020
 
CybercrimeWhat is itBrennan (2010) submits that Cyber.docx
CybercrimeWhat is itBrennan (2010) submits that Cyber.docxCybercrimeWhat is itBrennan (2010) submits that Cyber.docx
CybercrimeWhat is itBrennan (2010) submits that Cyber.docx
 
Information Security - A Discussion
Information Security  - A DiscussionInformation Security  - A Discussion
Information Security - A Discussion
 
computer virus with full detail
computer virus with full detail computer virus with full detail
computer virus with full detail
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Evolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptxEvolution of Hacking- Ronit Chakraborty .pptx
Evolution of Hacking- Ronit Chakraborty .pptx
 

Dernier

AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjekAIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjekpavan402055
 
Kwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính ThứcKwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính ThứcKwin68 Club
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubaikojalkojal131
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...Amil Baba Dawood bangali
 
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...Amil baba
 
RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作f3774p8b
 
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作ss846v0c
 
Computer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdfComputer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdfShahdAbdElsamea2
 
澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作rpb5qxou
 

Dernier (9)

AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjekAIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
AIMA_ch3_L2-complement.ppt kjekfkjekjfkjefkjefkjek
 
Kwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính ThứcKwin - Trang Tải App Game Kwin68 Club Chính Thức
Kwin - Trang Tải App Game Kwin68 Club Chính Thức
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uk England Northern ...
 
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
Uae-NO1 Amil Baba In Karachi Kala Jadu In Karachi Amil baba In Karachi Addres...
 
RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作
 
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
美国IUB学位证,印第安纳大学伯明顿分校毕业证书1:1制作
 
Computer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdfComputer Organization and Architecture 10th - William Stallings, Ch01.pdf
Computer Organization and Architecture 10th - William Stallings, Ch01.pdf
 
澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作澳洲Deakin学位证,迪肯大学毕业证书1:1制作
澳洲Deakin学位证,迪肯大学毕业证书1:1制作
 

Network security history

  • 2. Network security history  First time network introduce by ARPANET 1960-70  ARPANET advance research project agence
  • 3. Network security definition  To deliver data from source to destination in a safe way over a network  Before 90s security were relatively uncommen because internet is limited and every one knew each other risk and threat is limited  70s and 80s on internet playing particular jokes with each other  Popularization of term hacker shows in a movie WAR GAME
  • 4. Robert Tappan Morris (born November 8, 1965) is an American computer scientist and entrepreneur. He is best known for creating the Morris Worm in 1988, considered the first computer worm on the Internet. The first widespread virus for an IBM PC operating system was called Brain in 1983 First virus release in Pakistan know as brain 1988 next cyber attacket by rober moras about 6000 computer disable Get there data and copy it and earn 10 thousand dollar
  • 5. First anti virus  John mcafee 1991 dicoverd antivirus by the name of NORTON  10 Best Free Antivirus Software | 2017 Edition  Bitdefender Antivirus Free Edition. ...  Avira Antivirus. ...  Avast Free Antivirus. ...  AVG Free Antivirus. ...  Kaspersky Lab Internet Security 2017. ...  Sophos Home Free Antivirus. ...  Panda Free Antivirus. ...  Comodo Antivirus.
  • 6. Famous cyber attacks  [Solar sunrise 1998] 500 computer system hacked by two California teenager  Melissa virus 1999 thousand of computer damage and 80 million damage  Code red warm 2001  Nimba virus 2001  Dos attack 2002  My doom 2004  So on  Flame malware 2012
  • 7. ? Increase  More flate form available  Mobile phone  App  Cloud  Social media fb twitter etc  70% hacker from russia
  • 8. Anonymous?  Who is the leader of the Anonymous?  Hector Xavier Monsegur, nicknamed Sabu, was arrested in 2011 and admitted involvement in hacking companies like MasterCard and PayPal. In 2013, Jeremy Hammond was sentenced to ten years in prison for his Anonymous hacking. Several other names have been made public, but the group remains true to their name: anonymous.Jul 29, 201