-
A history and explanation of the birth of ransomware
While ransomware has maintained prominence as one of the biggest threats since 2005, the first attacks occurred much earlier. According to Becker’s Hospital Review, the first known ransomware attack occurred in 1989 and targeted the healthcare industry. 28 years later, the healthcare industry remains a top target for ransomware attacks. Link text -
The evolution of firewalls and other network security defense systems
Firewalls were born as a software tool to control access from largely unstructured and non-targeted threats. Over time, they evolved into purpose-built hardware devices. These appliances were not only forced to adapt to ever-increasing performance requirements, but as attacks became more sophisticated they had to adopt additional security and non-security functionality.Link text -
The evolution of tools (software and hardware) used to mitigate cybersecurity threats
They are many data defense tools that merge withing the time including:
• Network Security Monitoring tools
• Encryption Tools
• Web Vulnerability Scanning tools
• Network Defense Wireless Tools
• Packet Sniffers
• Antivirus Software
• Firewall
• PKI Services
• Managed Detection Services
• Penetration Testing
some software used are: wireshark, webroot, snort, bitdefender, Link test -
The historical exploits affecting current security architecture and deployment
The past year has witnessed an amazing number of articles, reports, seminars and news stories
about successful hacking attempts and the lack of data and/or network security. The GAO recently reported that:“Despite indications that agencies have improved their compliance with parts of the Federal Information Security Management Act (FISMA), many major agencies still consider their information security controls has significant deficiency or material weakness” -
A history of viruses, malware, and other recurring software enigmas
A brief look at the history of malware shows us that this malicious menace has been with us since the dawn of computing itself. According to Scientific American, the idea of a computer virus extends back to 1949, when early computer scientist John von Neumann wrote the “Theory and Organization of Complicated Automata, a brief history of malware-It evolution and impact -
The initiation of white hat vs. black hat hacking
The term ‘Hacker’ was coined in the 1960s at the Massachusetts Institute of Technology to describe experts who used their skills to re-develop mainframe systems, increasing their efficiency and allowing them to multi-task.Nowadays, the term routinely describes skilled programmers who gain unauthorized access into computer systems by exploiting weaknesses or using bugs, Black Hat hackers are motivated by malicious intent, personal gains, whereas White Hat hackers seek out and remedy vulnerability