1 00:00:10,470 --> 00:00:13,100 So let's get started. 2 00:00:13,260 --> 00:00:15,210 The history of cybersecurity. 3 00:00:17,840 --> 00:00:25,820 In this lecture, we learn how cybersecurity evolved when was the first cyber threat that occurred and 4 00:00:25,820 --> 00:00:28,580 obviously the evolution of cybersecurity. 5 00:00:30,960 --> 00:00:39,300 1980S was the era of computer worms, the creation of the first computer worm was a milestone in the 6 00:00:39,300 --> 00:00:41,130 history of cybersecurity. 7 00:00:42,000 --> 00:00:49,830 Researchers traced the very first disastrous computer worm to Robert Demorris, who was a graduate student 8 00:00:49,830 --> 00:00:51,280 from Cornell University. 9 00:00:52,470 --> 00:00:58,170 Morris was curious about the Internet's size and created a boom in 1988. 10 00:00:58,380 --> 00:00:58,900 Gurjit. 11 00:00:59,830 --> 00:01:06,250 The worm was designed to infect Unix systems such that it would count the total connections present 12 00:01:06,400 --> 00:01:15,430 of a modest 021 program that would propagate across a set of networks, use a known vulnerability to 13 00:01:15,430 --> 00:01:18,970 infiltrate Unix terminals and then replicate itself. 14 00:01:20,440 --> 00:01:28,270 However, this turned out to be a huge mistake, a programming error because the worm to infect machine 15 00:01:28,270 --> 00:01:28,930 after machine. 16 00:01:30,130 --> 00:01:38,950 As a result, networks clogged, causing the connection systems to crash the worm, replicating aggressively 17 00:01:38,950 --> 00:01:45,250 to a point where the indirect slowed down to a crawl, leaving untold damage in its wake. 18 00:01:46,290 --> 00:01:53,070 This one is the first to have received full media coverage and was among the very first programs to 19 00:01:53,070 --> 00:01:55,860 return to exploit system until Britta's. 20 00:01:57,550 --> 00:02:05,260 The womb's effect lasted beyond the crash, Internet and connected systems, for one modest, became 21 00:02:05,260 --> 00:02:10,600 the first person to be charged successfully under the Computer Fraud and Abuse Act. 22 00:02:11,710 --> 00:02:18,340 He was fined ten thousand dollars and then sentenced to probation of three years and dismissed from 23 00:02:18,340 --> 00:02:23,950 court, although he went on to become an MIT professor. 24 00:02:25,140 --> 00:02:31,410 This act for the led to the development of computer emergency response team, that is so. 25 00:02:33,040 --> 00:02:38,410 The modest one triggered the start of an entirely new field in computer security. 26 00:02:39,040 --> 00:02:46,420 It led to more people researching on how they can create a deadlier and more effective bombs and viruses. 27 00:02:49,800 --> 00:02:53,010 1990S was the era of viruses. 28 00:02:54,520 --> 00:03:01,300 As previously mentioned, the models will pave the way for new types of malicious programs, viruses 29 00:03:01,300 --> 00:03:05,740 were more aggressive programs that came into light in the 1990s. 30 00:03:06,740 --> 00:03:14,780 Why does such as I Love You and Melissa infected tens of millions of computers, causing a worldwide 31 00:03:14,780 --> 00:03:22,700 failure of immune systems, most of the virus attacks were primarily concerned with financial gains 32 00:03:23,330 --> 00:03:25,030 or strategic objectives. 33 00:03:26,020 --> 00:03:33,130 However, inadequate security solutions at that time caused a huge number of unintended victims to be 34 00:03:33,130 --> 00:03:33,610 affected. 35 00:03:34,820 --> 00:03:42,010 Suddenly, cyber threats and attacks were a huge concern, necessarily being the creations of an immediate 36 00:03:42,010 --> 00:03:42,570 solution. 37 00:03:43,930 --> 00:03:51,160 This problem gave birth to the antivirus software solutions, the programs were designed to detect the 38 00:03:51,160 --> 00:03:56,290 presence of viruses and to prevent them from accomplishing that intended tasks. 39 00:03:57,300 --> 00:04:05,310 The primary delivery method for virus was the use of malicious e-mail attachments, and therefore this 40 00:04:05,310 --> 00:04:15,240 gave rise to the antivirus industry in the early 1990s, saw a sharp growth of companies creating and 41 00:04:15,240 --> 00:04:17,010 retaining antivirus products. 42 00:04:17,760 --> 00:04:22,890 The products were scanning computer systems for the presence of viruses or worms. 43 00:04:23,890 --> 00:04:31,810 At the same time, the available and solution scanned business I.T. systems and tested them with signatures 44 00:04:32,050 --> 00:04:33,250 written in a database. 45 00:04:34,480 --> 00:04:37,920 All of these things we are going to study in the later part of this school's. 46 00:04:39,280 --> 00:04:46,390 However, two significant problems had high impact and the effectiveness of these early antivirus solutions. 47 00:04:48,340 --> 00:04:55,480 The issues persist today in some of the current cybersecurity solutions, the problems included, the 48 00:04:55,480 --> 00:05:02,770 intensive use of resources are a large number of false positives and the former cause of most problems 49 00:05:02,770 --> 00:05:10,480 for users since antivirus solutions scanning systems used a lot of available resources such that the 50 00:05:10,510 --> 00:05:13,660 Internet user activities and productivity. 51 00:05:16,040 --> 00:05:22,820 The endpoint protection platforms slowly proved to be a better security solutions for countering an 52 00:05:22,820 --> 00:05:24,710 increasing rate of virus attacks. 53 00:05:26,060 --> 00:05:31,130 Customers realized that it was possible to detect and stop unknown malware. 54 00:05:31,550 --> 00:05:35,600 Since only a signature of the existing malware was required. 55 00:05:37,690 --> 00:05:39,830 Then come the first hacker group. 56 00:05:40,780 --> 00:05:47,650 What is a hacker group, it consists of individuals with exceptional hacking skills, but they use it 57 00:05:47,650 --> 00:05:51,040 for unauthorized access and illegal activities. 58 00:05:52,030 --> 00:05:59,320 Main purpose of such hacker group is the financial gain, and the money behind it will see the types 59 00:05:59,320 --> 00:06:01,170 of hacking groups later in this course. 60 00:06:01,810 --> 00:06:09,930 But your knowledge Anonymous was the first hacker group that came into the light on October one, 2003. 61 00:06:11,110 --> 00:06:18,310 It first made news when it hacked a website belonging to the Church of Scientology to Deros attack. 62 00:06:18,970 --> 00:06:22,210 And this is where hacking organization struck. 63 00:06:24,840 --> 00:06:33,390 So we saw the history of cybersecurity, we saw how the first one started affecting the world and which 64 00:06:33,390 --> 00:06:38,160 led to the development of many cyber security hacking organizations. 65 00:06:40,640 --> 00:06:45,300 In the next lecture, you will see the scope and career of cybersecurity. 66 00:06:45,980 --> 00:06:52,820 The next lecture is very important for you if you really want to create a nice and decent career in 67 00:06:52,820 --> 00:06:53,780 cybersecurity.