In the world of computing for the most part the devices used are owned by normal average day person. But, this can suddenly flip when someone with a curious knowledge for technology exceeds the standard use for a computer. They are able to access data on a computer system without the owner knowing that their network is being infiltrated, unless it is a big corporation with cyber security. This is often known as the term “hacking” which is defined as an “expert at programming and solving problems with a computer” according to the Merriam-Webster Dictionary. But before hacking was seen as something negative it started off as just something someone would do for fun. It is said to have originated at the Massachusetts Institute of Technology where programmers would make software and hardware run rapidly than their default settings.

The first signs of hacking came in the 1970s from John Draper who was able to make free telephone calls with a tone from a whistle that came in a cereal box. Later on, others joined in being able to make free telephone calls with a device called “blue box”. This later evolved into using computers to gain unauthorized access to networks. One of the first online hacking incident was in 1983 when a group of hackers from Milwaukee pierced through the networks of the Memorial Sloan-Kettering Cancer Center and the Los Alamos National Laboratory.

After, this incident more of these events started to become more frequent. That the government had to step in by making laws and acts to try and regulate hackers. Acts such as the, Comprehensive Crime Control Act, Computer Fraud and Abuse Act, and the Electronic Communications Privacy Act. Even though the government has tried to regulate online attacks, I feel like internet security is always going to vulnerable to the point that those abusing their knowledge can exhausted those fighting for security.

Advertisements