GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment

GUEST ESSAY – Notable events in hacking history that helped transform cybersecurity assessment
By April Miller

Assessing the risks involved in using the latest technology is something our culture had to adopt in the early days of the computer. New technologies come with risks — there’s no denying that.


Related: How Russia uses mobile apps to radicalize U.S. youth





Miller

To minimize their impact, implementing preventive security measures into these advanced systems is crucial. Businesses across all industries can function adequately without worrying about would-be hackers with malicious intent when they secure their networks.


Phishing scams, malware, ransomware and data breaches are just some of the examples of cyberthreats that can devastate business operations and the protection of consumer information.


Here are five notable historical events that influenced cybersecurity assessment and transformed it into what it is today:


The Battle of Midway (1942)


After the devastating blow of Pearl Harbor, U.S. military officials hired data analysts to crack the Japanese secret code known as JN-25.




After analysts cracked the code, Commander Joseph Rochefort could relay the Japanese Navy’s future plans to Admiral Chester Nimitz. As a result, the U.S. Navy intercepted Japanese forces before reaching the critical island base, Midway.

This was considered a significant win for the U.S. military and the analysts who worked to gather intelligence and relay these critical, decoded messages to prevent further attack. It foreshadowed how encryption would come to be used as a foundation for Interne ..

Support the originator by clicking the read the rest link below.