Chapter 1 – |
Brief History and Mission of Information System Security |
Seymour Bosworth
Robert Jacobson, CPP
Chapter Contents:
|
1.1 |
|
Introduction to Information System Security
|
|
1.2 |
|
Evolution of Information Systems
|
|
1.2.1 |
|
1950s: Punched-Card Systems
|
|
1.2.2 |
|
Large-Scale Computers
|
|
1.2.3 |
|
Medium-size Computers
|
|
1.2.4 |
|
1960s: Small-Scale Computers
|
|
1.2.5 |
|
Transistors and Core Memory
|
|
1.2.6 |
|
Time Sharing
|
|
1.2.7 |
|
Real-time, Online Systems
|
|
1.2.8 |
|
A Family of Computers
|
|
1.2.9 |
|
1970s: Microprocessors, Networks, and Worms
|
|
1.2.10 |
|
The First Personal Computers
|
|
1.2.11 |
|
The First Network
|
|
1.2.12 |
|
Further Security Considerations
|
|
1.2.13 |
|
The First "Worm"
|
|
1.2.14 |
|
1980s: Productivity Enhancements
|
|
1.2.15 |
|
The Personal Computer
|
|
1.2.16 |
|
Local Area Networks
|
|
1.2.17 |
|
1990s: Total Interconnection
|
|
1.2.18 |
|
Telecommuting
|
|
1.2.19 |
|
Internet and the World Wide Web
|
|
1.3 |
|
Ongoing Mission for Information System Security
|
|
1.4 |
|
Notes
|
|
|
|