Early Days of Computer Security

As the Title suggests, Lets discuss the early days of Computer Security and by early days I mean from 1950's and 1960's. I have taken the reference from computer security book "Security in Computing " by "Charles Pfleeger" and two other authors. "Willis Ware" had written a brief overview about early days of computing which i am going to discuss it next.

Lets go back in 1950's

In 50's and 60's, there were mainly two conferences yearly in US named Joint Computer Conferences (JCC) later renamed to National Computer Conference (NCC) where Computer Technology Enthusiastic, Researchers, Scientists, Engineers visit Conference. Nowadays The Term "Computer Security" has got changed to "Information Systems Security". Due to wide spread of computers, Entire Computer Security Industry moved from Private Defence classified Interest to Public View.

Three People namely "Robert Patrick, John Haverty, Willis Ware" observed the Country's Growing Dependency on Computer Technology for Various Tasks which raises concerns related to Security of these Systems against Destructive Attacks.
Therefore, They Decided to bring attention of the Country, Government, Security Agencies, etc towards Computer Security Aspects.

National Security Agency (NSA) and US Air Force (USAF) Comes into Action

The Growing Attention towards Computer Security led to Development of Remote Access time sharing Systems running on Univac 494 machine with full set of Security access controls which was not only being used by NSA Headquarters but also by the entire World. After this event, NSA published Reports and papers in JCC Conference and in Atlantic Hall, year 1967.

Now, Classified Documents and business applications also started to get integrate into computer systems due to computer Security. The Defence contractors started solving issues related to Computer Systems. Advanced Research Projects Agency (ARPA) formulated policy for Department of Defence that could be base for Further Computer Security Research Projects. In 1979, the report also known as "Ware Report" got officially declassified and published (although it was classified in 1970).

Now US Air Force Sponsors another Computer Security R&D program chaired by James Anderson for a period of 6 Years with a total cost of 8M$. The report was published in 1972. Similarly, 4 more US Air Force Programs were conducted of which 1 program eventually led to NSA " Criteria and Evaluation" program sponsored by NSA which focused on Operating System Access control for specific computer.

Understanding the Importance of Classified documents in early decades

Department of Defence, NSA has a very long history in protecting classified information in physical document paper format. In this method, they organised documents into groups, sub-groups and super groups in which each require specific clearance and need to know access reason. NSA also had a centuries long legacy and experience of protecting classified documents in transit.

Therefore, it was important to study the issues that would come after using computer systems as a means of managing documents, etc. In 1960's and later, the issue was to emulate this same process of Protecting documents after paper world plus associated issues like Software attacks, unauthorized use, change of documents, developing procedures, methods, rules, regulations, etc.
It was hardly the matter of converging Hardware/Software to yield Secure System and operating environment.

World Wide Web and Internet Evolves

The world has changed in essential ways. The Desk-top and workstations has emerged and spread widely door to door. The Internet is Flourishing and Networking has exploded, its a rule not the exception. Networking is Important

The Effect is therefore more impactful as Computer systems - Information systems, databases, hardware, software, processes, communications are exposed to an environment over which no one has control - not even government, end user, network administrator. What must be done is to provide Appropriate Operational, technical, procedural safeguards against threats.

As the world evolves, thus Reliance on Computer Systems increases and information flow is mandatory. Therefore Computer Security has to protect in every possible dimensions - Technical, Procedural, operational, environmental 

Comments

Popular posts from this blog

Let us C book Chapter 1 Exercise Solutions

Use your old android phone as a Wifi router/Access point for your home network to extend Wi-fi Signal

Data Structures book chapter 3 exercise solutions