From the course: Learning Cryptography and Network Security

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Compare network attacks

Compare network attacks

From the course: Learning Cryptography and Network Security

Start my 1-month free trial

Compare network attacks

- [Instructor] In today's world, it's everyone's responsibility for the security of an organization. However, when computers first came into the picture, security was dedicated on protecting access to the physical systems. I met this webpage Timeline of Computer History. It's a super neat site I encourage you to explore. I'll focus on three different areas. First, let's take a look at 1946. We'll go to the 1940s, and 1946, and I'll scroll down. Here we see a picture of the ENIAC, which was a large mainframe that filled a room. As you can see, you would actually have to be physically in front of it to do anything malicious. Next, we'll jump ahead to 1957. We'll go to the 1950s, and 1957. And here we see that Digital Equipment Corporation or DEC was created along with the development of FORTRAN, which was a powerful scientific computing language. Now we'll jump to 1977. Go to the 1970s, and 1977. We begin to see…

Contents