History of information security. From the ancient day’s communication, military captains and diplomats knew the essence to have specific methods to protect the confidentiality of correspondence and have some mechanism to detects the threats. The credit is given to Julius Caesar who invented Caesar Cipher around 50 B.C. to stop his secret messages being read by the wrong hands. The sensitive information was marked that indicated that it should be transported and protected by trusted personnel only and it should be guarded and stored in a secure environment or safe location.
Since the postal service expanded the official organizations were created by the governments to decipher, intercept, read and reseal letters. In the middle of 19th-century complex classification systems were developed to enable governments to manage the information regarding the degree of sensitivity. In 1889, the British Government complexed this to some level by the publication of the Official Secrets Act.
In 1919 the Government Code and Cipher School were established in the United States. During the time of the Second World war, the encoding became more complex as machines were used to scramble and unscramble information. The process used to ensure the documents were appropriately destroyed and it was unsuccessful in following these processes which led to some of the best intelligence organizations of the war.
There was a rapid advancement in computer hardware, software, telecommunication, and data encryption by the end of the 20th century and the starting of the 21st century. The invention of smaller, cheaper and more powerful computing devices made electronic data processing within the graph of general small business and home access. These computers became interconnected with each other quickly via the internet.
The increase and extensive use of electronic data processing and electronic business held via the internet with many occurrences of worldwide terrorism ignited the essence for the natural methods of protecting the computers and the information stored, processed and transmitted through them. The academic knowledge of computer security and information assurance emerged in many professional companies which shared the common motto of reliability and security of information systems.