Interesting to read that a task force formed by arpa


Please reply one paragraph you thoughts on this research:

Interesting to read that a task force formed by ARPA (Advanced Research Projects Agency) to study internet security in 1967 which entailed investigating the vulnerability of securing physical locations and hardware for data centers at that time.

This method was deemed inadequate, and the Rand Report R-609 determined additional steps must be taken to improve security. It was this report that marked an important stage in the development information security as we know it today.

The need for information security began with the birth of Internet in 1983 which began with a connection of interconnect networks called the ARPA Internet which was used by the Department of defense.

During this time Horst Feistel had developed an algorithm called Lucifer Algorithm which could be used to scramble data which was one of the most secure crypto systems at that time. Since the birth of the Internet we have advanced to social media, cellphones, home security and other technological advances that makes us vunerable.

The first person to infect computers were Robert Tapen Morris a student of Cornell released several dozen lines of code which replicated and infected thousands of computers with the Morris Worm.

Morris was the first person convicted by a jury for computer fraud and abuse. Robert Morris opened the door for other attackers which has increased exponentially since that time.

Since the inception of the first computer worm in the late 1980's to the 2016 Russian Hack it is evident that we need Information Security at all level of network.

The IT administrator roles has evolved from troubleshooting, updating network applications, maintaining backups, installing and updating virus software and resolve hardware issues, etc., and in the next 10 years the administrator role will also include the role of security administrator which manage organizations security systems will increase to include network and cybersecurity and possibly home security.

It is evident that inadequate security has left individuals, corporations, and government more vulnerable to illegal activities such as computer fraud, telecommunications abuse, and the unauthorized disclosure, modification, or destruction of information.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Interesting to read that a task force formed by arpa
Reference No:- TGS02603920

Now Priced at $10 (50% Discount)

Recommended (98%)

Rated (4.3/5)