A Brief History Of Internet Security, Technology Hit The Market

Share It On:

History of information security. From the ancient day’s communication, military captains and diplomats knew the essence to have specific methods to protect the confidentiality of correspondence and have some mechanism to detects the threats. The credit is given to Julius Caesar who invented Caesar Cipher around 50 B.C. to stop his secret messages being read by the wrong hands. The sensitive information was marked that indicated that it should be transported and protected by trusted personnel only and it should be guarded and stored in a secure environment or safe location.
Since the postal service expanded the official organizations were created by the governments to decipher, intercept, read and reseal letters. In the middle of 19th-century complex classification systems were developed to enable governments to manage the information regarding the degree of sensitivity. In 1889, the British Government complexed this to some level by the publication of the Official Secrets Act.
In 1919 the Government Code and Cipher School were established in the United States. During the time of the Second World war, the encoding became more complex as machines were used to scramble and unscramble information. The process used to ensure the documents were appropriately destroyed and it was unsuccessful in following these processes which led to some of the best intelligence organizations of the war.
There was a rapid advancement in computer hardware, software, telecommunication, and data encryption by the end of the 20th century and the starting of the 21st century. The invention of smaller, cheaper and more powerful computing devices made electronic data processing within the graph of general small business and home access. These computers became interconnected with each other quickly via the internet.
The increase and extensive use of electronic data processing and electronic business held via the internet with many occurrences of worldwide terrorism ignited the essence for the natural methods of protecting the computers and the information stored, processed and transmitted through them. The academic knowledge of computer security and information assurance emerged in many professional companies which shared the common motto of reliability and security of information systems.

Share It On:

Recent Posts

IME Life Insurance: 30-Day Deadline to Submit Missing Claim Documents to Avoid Closure

IME Life Insurance: 30-Day Deadline to Submit Missing Claim Documents

Share It On: 15th January 2025, Kathmandu IME Life Insurance Company Limited has requested that policyholders who filed claims by

CYC Nepal AGM: Key Decisions on Merger and Future Direction

CYC Nepal AGM: Key Decisions on Merger and Future Direction

Share It On:15th January 2025, kathmandu CYC Nepal Laghubitta Bittya Sanstha Limited has rescheduled its 6th Annual General Meeting (AGM)

Nepal Banks Skip Dividend Payouts: NIC Asia & Nepal Bank Retain Profits

Nepal Banks Skip Dividend Payouts: NIC Asia & Nepal Bank

Share It On: 15th January 2025, kathmandu NIC Asia Bank has decided not to distribute dividends to its shareholders for

vivo V40 Series Launched in Nepal: Featuring ZEISS Cameras and 0% EMI

vivo V40 Series Launched in Nepal: Featuring ZEISS Cameras and

Share It On:15th January 2025, Kathmandu vivo, a global leader in the smartphone industry, ushers in a new era of

Glocal Skill Hero Award 2025: Recognizing Nepal’s Top Innovators and Entrepreneurs in Skill Development

Glocal Skill Hero Award 2025: Recognizing Nepal’s Top Innovators and

Share It On:15th January 2025, Kathmandu Skill Week 2025 ended with a splendid closing ceremony amidst a remarkable gathering held

Citizens Bank CSR Initiatives: Ongoing Support for Orphaned Children and Social Change

Citizens Bank CSR Initiatives: Ongoing Support for Orphaned Children and

Share It On:15th January 2025, kathmandu Citizens Bank International Limited has reaffirmed its dedication to corporate social responsibility (CSR) by