Professional Documents
Culture Documents
IT Security Timeline
1969 1975 1977 1979 1982 1983 1985 1986 1988 1989 1990
First message First test Apple II FFIEC Commodore ARPANET Windows Computer Morris worm SANS ARPANE
sent via of TCP/ IP 64 migrated to 1.0 Fraud and → CERT Institute decommis-
ARPANET between TCP/IP Abuse Act founded sioned →
two Internet
ISACA networks “WarGames” (ISC)² born
founded founded
HTTP,
“Cuckoo’s HTML, first
Egg” web server,
first web
browser
1992 1993 1994 1995 1996 1999 2000 2001 2002 2003 2004
Michelangelo First DEF CISSP SSL High-profile Melissa virus ILOVEYOU NIST FISMA National PCI DSS
virus CON credential- website de- worm chooses Cyber
conference launched BS 7799 facements Back Orifice AES Sarbanes- Security
“Sneakers” (CIA, USAF, 2000 Oxley Division
SAS 70 Vladimir etc.) First major opens
Levin hacks GLBA DDoS attack California within
Citibank HIPAA involving enacts first
Dept. of
DNS data breach-
Homeland
COBIT notification
Security
servers as law
reflectors Anonymous
formed
Code Red
worm
NIST SP VA loses Successful Cloud Conficker Stuxnet FedRAMP Marriott OPM White
800-53 laptop spear phish- Security worm worm hacked hacked House
containing ing attack Alliance SSAE 16/ hacked
ISO/IEC data on 26.6 of Office of FAA hacked US Cyber SOC 2 Farmers Target
27001 veterans Secretary of Command Insurance hacked Anthem
HITECH activated Bank of hacked hacked
and families Defense
TJX hacked America Sony hacked
21,549 sites Country hacked Mastercard Pentagon
hacked Home hacked
defaced of Estonia
PlayStation Depot
at once suffers
Network SCADA hacked IRS hacked
by single 22-day
hacked systems of
hacker DDoS US Postal United
6 countries
attack Reported including US Service Airlines
hacks hacked hacked hacked
of DoD,
Pentagon, CIA
NASA, etc. Director’s
email
700,000 hacked
websites
defaced SSL official-
at once ly replaced
by single by TLS 1.2
hacker
Trends:
• Attacks: more sophisticated, frequent, and successful
• Need for security professionals increasing: regulatory requirements, business self-protection, customer demands, etc.
Legend:
• Technology
• Hacks, Attacks, and Data Breaches
• Laws, Rules, Standards, and Regulations
• Certifications and Organizations