Written by Shila Toledano
The Evolution of Cyber Security
The 70s introduced us to the first computer virus (Maybe). The program was not malicious, so we might say it wasn’t a virus, but it kind of worked like one.
Creeper was more like a worm than a virus- it would print out the message: ‘’I am the creeper catch me if you can ’’. Computers then didn’t always have displays, so it would print out the massage from a device called Teletype.
Creeper would find another Tenex system (one of the first versions of the internet) using RSEXEC. It would then open a connection and transfer itself, with the main goal being jumping from one computer to another while deleting its tracks.
Creeper would not exploit network vulnerabilities or aim to cause damage. It was an innocent time back then, and cyber security was still in its diapers.
Then Raymond Tomlinson, who is considered the father of Email, enhanced the Creeper so it can replace itself, and thus turn into an actual virus.
The first famous viruses
The program Reaper is considered to be the first anti-virus. Its original mission was to look for signs of Creeper and delete them when found.
The irony of it all is that Reaper was also a worm that copied itself, basically turning it into a virus.
Later on, Robert Morris created a worm that dramatically slowed down internet speed and functionality. Originally, this worm didn’t have any harmful intent. On the contrary, his mission was to highlight security flaws.
However, a disastrous fault in the code caused it to replicate itself, creating extensive damage. Vital military and university functions slowed to a crawl, emails were delayed for days and chaos ensued. The first big cyber drama.
SSL is an internet protocol that encrypts communication between your computer and your online destination. this protocol was released in 1995 and is still going strong. Finally, cyber security became mainstream, and the production of anti-hacking software started to kick off.
Anonymous, WikiLeaks, and the ”I love you” pervasive email attack was the main hacking sensations that drove the world mad in the 2000s. 2010 brought with operation ‘’Aurora ’’ a coordinated attack on google’s infrastructure in china. Then the Yahoo attack came along and played the victim role in one of the largest-scale hacks in history with 3 billion user accounts being compromised.
What is EDR and how did we get there?
Endpoints (threat) detection & response. EDR isn’t designed to detect all laptops and phones in your network, but rather to proactively detect threats on endpoints when they accrue and respond to them in real time.
The evolution of cyber security and endpoint detection and response (EDR) has been driven by the increasing sophistication and prevalence of cyber threats. As the internet and computer networks have become integral to daily life, the risk of cyber-attacks has also grown. Cyber security measures and technologies have had to evolve to keep up with these threats and protect individuals, businesses, and governments from harm.
EDR uses a combination of machine learning, artificial intelligence, and other technologies to monitor network traffic and identify potential threats in real-time. If a threat is detected, EDR can take a variety of actions, including blocking the threat, quarantining the device, or alerting security personnel.
The evolution of cyber security and EDR has been driven by the need to keep up with the ever-evolving landscape of cyber threats. As technology continues to advance, so too will the technologies used to protect against cyber attacks. It is important that individuals, businesses, and governments stay up-to-date on the latest cybersecurity technologies and best practices in order to stay safe and secure in the digital age.