网络犯罪和网络安全的简史—— 1940 - 2020

注:机翻,未校对。


The History Of Cybercrime And Cybersecurity, 1940-2020

From phone phreaks to next generation cyberattacks

从电话攻击到下一代网络攻击

– Katie Chadd

Prague, Czech Republic – Nov. 30, 2020

From the 1940s to the present, discover how cybercrime and cybersecurity have developed to become what we know today.
从 1940 年代到现在,了解网络犯罪和网络安全如何发展成为我们今天所知道的。

Many species evolve in parallel, each seeking a competitive edge over the other. As cybersecurity and technology have evolved, so have criminals and ‘bad actors’ who seek to exploit weaknesses in the system for personal gain – or just to prove a point.
许多物种并行进化,每个物种都寻求优于其他物种的竞争优势。随着网络安全和技术的发展,犯罪分子和 “不良行为者” 也越来越多,他们试图利用系统中的弱点谋取私利,或者只是为了证明一个观点。

This arms race has been going on since the 1950s, and this article explains the evolution of cyberattacks and security solutions.
这场军备竞赛自 1950 年代以来一直在进行,本文解释了网络攻击和安全解决方案的演变。

1940s: The time before crime

For nearly two decades after the creation of the world’s first digital computer in [1943](https://www.computerhistory.org/timeline/computers/#:~:text=Started in 1943%2C the ENIAC,faster than any previous computer.), carrying out cyberattacks was tricky. Access to the giant electronic machines was limited to small numbers of people and they weren’t networked – only a few people knew how to work them so the threat was almost non-existent.
自 1943 年世界上第一台数字计算机问世以来的近二十年里,进行网络攻击一直很棘手。巨型电子机器的访问仅限于少数人,而且它们没有联网 —— 只有少数人知道如何操作它们,因此威胁几乎不存在。

Interestingly, the theory underlying computer viruses was first made public in 1949 when computer pioneer John von Neumann speculated that computer programs could reproduce.
有趣的是,计算机病毒背后的理论是在 1949 年首次公开的,当时计算机先驱约翰・冯・诺依曼(John von Neumann)推测计算机程序可以复制。

1950s: The phone phreaks

The technological and subcultural roots of hacking are as much related to early telephones as they are to computers.
黑客攻击的技术和文化根源与早期的电话有关,就像它们与计算机一样。

In the late 1950s, ‘phone phreaking’ emerged. The term captures several methods that ‘phreaks’ – people with a particular interest in the workings of phones – used to hijack the protocols that allowed telecoms engineers to work on the network remotely to make free calls and avoid long-distance tolls. Sadly for the phone companies, there was no way of stopping the phreaks, although the practice eventually died out in the 1980s.
在 1950 年代后期,“电话盗窃” 出现了。该术语涵盖了 “phreaks”(对手机工作特别感兴趣的人)用来劫持协议的几种方法,这些协议允许电信工程师在网络上远程工作以拨打免费电话并避免长途收费。可悲的是,对于电话公司来说,尽管这种做法最终在 1980 年代消失了,但无法阻止这些恶作剧。

The phreaks had become a community, even issuing newsletters, and included technological trailblazers like Apple’s founders Steve Wozniak and Steve Jobs. The mold was set for digital technology.
这些人已经成为一个社区,甚至发布时事通讯,其中包括苹果创始人史蒂夫・沃兹尼亚克(Steve Wozniak)和史蒂夫・乔布斯(Steve Jobs)等技术开拓者。模具是为数字技术设定的。

Igor Golovniov / Shutterstock.com
伊戈尔・戈洛夫尼奥夫 / Shutterstock.com

1960s: All quiet on the Western Front

The first-ever reference to malicious hacking was in the Massachusetts Institute of Technology’s student newspaper.
有史以来第一次提到恶意黑客攻击是在麻省理工学院的学生报纸上。

Even by the mid-1960s, most computers were huge mainframes, locked away in secure temperature-controlled rooms. These machines were very costly, so access – even to programmers – remained limited.
即使在 1960 年代中期,大多数计算机都是巨大的主机,被锁在安全的温控室中。这些机器非常昂贵,因此即使是程序员也能获得这些机器。

However, there were early forays into hacking by some of those with access, often students. At this stage, the attacks had no commercial or geopolitical benefits. Most hackers were curious mischief-makers or those who sought to improve existing systems by making them work more quickly or efficiently.
然而,一些有访问权限的人(通常是学生)很早就开始尝试黑客攻击。在这个阶段,这些攻击没有商业或地缘政治利益。大多数黑客都是好奇的恶作剧制造者,或者是那些试图通过使现有系统更快或更有效地工作来改进现有系统的人。

In 1967, IBM invited school kids to try out their new computer. After exploring the accessible parts of the system, the students worked to probe deeper, learning the system’s language, and gaining access to other parts of the system.
1967 年,IBM 邀请学童试用他们的新计算机。在探索了系统的可访问部分之后,学生们努力进行更深入的探索,学习系统的语言,并获得对系统其他部分的访问权。

This was a valuable lesson to the company and they acknowledged their gratitude to “a number of high school students for their compulsion to bomb the system”, which resulted in the development of defensive measures – and possibly the defensive mindset that would prove essential to developers from then on. Ethical hacking is still practiced today.
这对公司来说是一个宝贵的教训,他们承认对 “一些高中生强迫轰炸系统” 表示感谢,这导致了防御措施的发展 —— 可能还有从那时起对开发人员至关重要的防御思维方式。道德黑客攻击至今仍在进行。

As computers started to reduce in size and cost, many large companies invested in technologies to store and manage data and systems. Storing them under lock and key became redundant as more people needed access to them and passwords began to be used.
随着计算机的尺寸和成本开始减小,许多大公司投资于存储和管理数据和系统的技术。随着越来越多的人需要访问它们并且开始使用密码,将它们存储在锁和钥匙下变得多余。

Roman Belogorodov / Shutterstock.com
罗曼・别洛戈罗多夫 / Shutterstock.com

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值