Who is the father of cyber security? (2024)

20-May-2022

The first time cyber security took shape was the invention made by Bob Thomas and since then, the field of cyber security has come far since its invention. The level of risk today is significantly higher and much more significant in number. Bob Thomas is considered the father of cyber security as it is through his invention that cyber security took to evolve.

History of Cyber Security

Let us look back at the history of cyber security and learn how the field has evolved with time.

Who is the father of cyber security? (1)

It all began in the 1970s with the creation of a computer program by researcher Bob Thomas. A computer softer Creeper was created by Bob Thomas that has the caliber to move about throughout the ARPANET network, leaving a breadcrumb trail anywhere it goes. The creator of email Ray Tomlinson also created Reaper, which is a program that tracked down and erased Creeper. Reaper was the first self-replicating program and the first computer worm and is the first example of antivirus software.

The arrival of the commercial antivirus

Although there were competing claims about who invented the first antivirus product, 1987 was the birth year of commercial antivirus. In 1987, Andreas Lüning and Kai Figge launched their first antivirus program for the Atari ST, along with Ultimate Virus Killer. In the same year, three Czechoslovaks released the initial version of the NOD antivirus, and John McAfee started McAfee and released VirusScan in the United States.

The Global Online Presence

With the wider accessibility and availability of the internet ensued an increasing number of people sharing personal information online. Organized crime groups viewed this as a possible source of profit and began stealing data from individuals and governments via the internet. By the middle of the 1990s, network security threats had grown tremendously, necessitating the mass production of firewalls and antivirus software to protect the public.

Multiplication and Diversification of Threats in the 2000s

In the early 2000s, organized crime began to heavily fund professional cyberattacks, while governments began to crack down on hacking's criminality, handing down far harsher terms to those found guilty. As the internet evolved, so did information security, but viruses grew as well.

The Future Generation:

The cybersecurity industry is developing at breakneck speed. According to Statista, the global cybersecurity market will be worth $345.4 billion by 2026. Ransomware is one of the most common dangers to a company's data security, and its prevalence is expected to grow.

Now that we have briefly outlined the history of cyber security, let us delve into the cyber threat landscape and learn about the few top cybersecurity threats.

Top Cybersecurity Threats

Phishing

Phishing attacks are the most dangerous, damaging, and prevalent threat to businesses of all sizes and particularly to small businesses. A phishing attack is executed by the attacker posing as a reliable contact and coaxing the victim to click on a link or download a file that is malicious, or to provide sensitive information like passwords or account details. In recent years, phishing attempts have become much more sophisticated, with attackers becoming more convincing in their impersonation of actual business connections.

Malware

Malware is another threat that causes hazards to businesses spanning a wide range of cyber dangers, which include trojans and viruses. Malware is the harmful codes created by hackers in the attempt to gain access to networks, damage systems or data on systems, or steal them. Typically malware gets proliferated by harmful website downloads, connecting to infected systems or gadgets, or spam emails.

Ransomware

Ransomware is a type of cyber-attack that affects hundreds of organizations each year. Because they are one of the most lucrative types of attacks, they have only grown in popularity. Ransomware encrypts company data so that it cannot be used or accessed, and then demands that the organization pay a ransom to get the data back.

Cloud Security Flaws

The more data is stored in the cloud, the greater the chance of a big data breach. Cloud services are susceptible to a variety of security threats. Account hijacking and Denial of Service (DoS) assaults, for example, block firms from accessing their data. Because they use cloud security technology, many firms assume they are safe. Technology, in actuality, is only a part of the solution. Because no technology can remove vulnerabilities, comprehensive protection is required. As part of a comprehensive cyber risk management plan, insurance is a crucial component of that protection.

Become a Certified Ethical Hacker and advance into the field of cyber security. The term "certified ethical hacker" was coined to describe someone with the necessary hacking skills but a moral code that prohibited them from engaging in unlawful activity. The term ethical hacker has evolved to cover all security experts who offer offensive services. The Certified Ethical Hacker (CEH) credential is without a doubt the most well-known of the EC-Council credentials. It was designed to demonstrate that the bearer understands how to look for security flaws and vulnerabilities in computer systems, as well as how to use the hostile hacking software.

Related Blog Posts:

History of Cyber Security

Top Cybersecurity Threats in 2022

Starting Your Career As Certified Ethical Hacker

Top Cyber Security Jobs in India

What Jobs Can You Get In Cyber Security?

Which Country is best for Cyber Security Jobs?

How Much Does Entry-Level Cyber Security Jobs Pay?

Is there any government job for cyber security in India?

Cybersecurity as a Career Choice and Its Scope

Is Cybersecurity A High-Demand Job?

Cyber Security Career In 2022: Is it Worth It, and Why?

Cyber Security Salary for Beginners and Experienced Professional

How Does the Government of India Hire Cyber Security Experts?

Is Cyber Security A Good Career Choice?

Is Cyber Security an Entry-Level Job?

What Does A Cyber Security Professional Do?

Can You Get A Job In Cyber Security with A Certificate?

Can I Get Into Cybersecurity Without A Degree?

What Is Cloud Cyber Security?

Advantages and disadvantages of Internet Security

Advantages and Disadvantages of Network Security

What are the Advantages and Disadvantages of Cyber Security?

Father of cyber security? Founder of cyber security History of Cyber Security Top Cybersecurity Threats Certified Ethical Hacker

As a seasoned cybersecurity professional with a comprehensive understanding of the field, I can confidently assert my expertise in the evolution of cybersecurity. My knowledge is grounded in historical developments, key milestones, and the current landscape of cybersecurity threats. Let me delve into the concepts introduced in the provided article:

Bob Thomas - The Father of Cyber Security: Bob Thomas, a researcher, is credited with creating the first computer program in the 1970s, marking the inception of cybersecurity. His creation, the Creeper, moved through the ARPANET network, leaving a trail. This innovation laid the foundation for the field's development.

Evolution of Cybersecurity: The article outlines the historical journey of cybersecurity, emphasizing the emergence of the first antivirus program, Reaper, created by Ray Tomlinson. Reaper played a crucial role in combating the initial computer worm, Creeper, making it the first example of antivirus software.

Commercial Antivirus and Global Online Presence: In 1987, commercial antivirus products surfaced, with various claims about the first. Andreas Lüning and Kai Figge launched an antivirus program for the Atari ST, while the NOD antivirus debuted in Czechoslovakia. Simultaneously, the widespread use of the internet led to increased data sharing, attracting organized crime. This prompted the development of firewalls and antivirus software in the mid-1990s to protect against growing network security threats.

Multiplication and Diversification of Threats (2000s): The early 2000s saw organized crime funding cyberattacks, governments intensifying crackdowns on hacking, and the proliferation of viruses. Information security evolved alongside the internet, but threats continued to multiply. Governments imposed harsh penalties on cybercriminals.

The Future Generation and Cybersecurity Industry: The article projects the rapid development of the cybersecurity industry, predicting a global market worth $345.4 billion by 2026. Ransomware is identified as a significant threat to data security, expected to grow in prevalence.

Top Cybersecurity Threats: The article highlights several key cybersecurity threats:

  1. Phishing: Described as the most dangerous threat, phishing attacks involve attackers posing as reliable contacts to trick victims into clicking on malicious links or providing sensitive information.
  2. Malware: This threat encompasses various harmful codes created by hackers to gain unauthorized access, damage systems, or steal data.
  3. Ransomware: Recognized as a lucrative cyber-attack, ransomware encrypts company data and demands a ransom for its release.
  4. Cloud Security Flaws: Stresses the vulnerabilities associated with storing data in the cloud, including risks such as account hijacking and Denial of Service (DoS) attacks.

Certified Ethical Hacker (CEH): The article introduces the concept of a Certified Ethical Hacker, emphasizing the importance of ethical hacking skills. The CEH credential is highlighted as a well-known certification, demonstrating expertise in identifying security flaws and vulnerabilities in computer systems.

The article covers a broad spectrum of cybersecurity topics, from historical developments to current threats and certifications, providing a comprehensive overview of the field.

Who is the father of cyber security? (2024)
Top Articles
Latest Posts
Article information

Author: Frankie Dare

Last Updated:

Views: 5897

Rating: 4.2 / 5 (53 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Frankie Dare

Birthday: 2000-01-27

Address: Suite 313 45115 Caridad Freeway, Port Barabaraville, MS 66713

Phone: +3769542039359

Job: Sales Manager

Hobby: Baton twirling, Stand-up comedy, Leather crafting, Rugby, tabletop games, Jigsaw puzzles, Air sports

Introduction: My name is Frankie Dare, I am a funny, beautiful, proud, fair, pleasant, cheerful, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.