100 likes | 170 Views
Explore the history of security, from cavemen using rocks to modern encryption techniques. Learn about guard dogs, moats, security guards, alarms, military code, vaults, and tokenization & encryption.
E N D
THE HISTORY OF SECURITY By: Imelda Reyes
STONE AGE • Cravemen originally used rocks, fruit, branches, and other natural resources to keep the predators away and to keep away from harm’s way. • Eventually, the cave people created spears, bow and arrows, and slingshots to hunt for food and to be able to survive.
30,000 BC: GUARD DOGS • Before parents would feel a sense of security when a guard dog was beside their child. They felt the dog protected the baby. • Orphaned wolf pups were rescued by humans and reared alongside babies. • People also felt safe around guard dogs because they knew they were protected from any harm.
3150 BC: MOAT AROUND CASTLE • A moat, the large trench or ditch surrounding a castle, was first created to protect the fortress during dangerous times. • First line of defense in keeping people secure.
1760-1840: SECURITY GUARDS • During the Industrial Revolution a lot of people began to employ the services of security guards for personal protection. • Today many businesses, such as banks and schools, employ security guards for protection.
1850's: HOME SECURITY SYSTEMS/ALARMS • In 1853, the first patent on electro-magnetic alarms meant that businesses and wealthy residents could secure valuables. • Magnetic contacts were installed on the windows and doors that, when tripped, would send a signal through the electromagnetic wiring and sound an alarm. • These groundbreaking security systems were effective in preventing break-ins from occurring.
1800's-1900's: MILITARY CODE • Cryptography was a common form of codemaking and codebreaking during the Civil War. • It was used to secure what was going on during the war.
18th & 19th century: VAULTS • Vaults began to appear in banks, large businesses, casinos, schools, and military buildings to store intellectual property, money, or even dangerous objects. • They are use to protect people’s valuable things.
1990's: WRITE-PROTCTION ON FLOPPY DISCS • Floppy discs were used to protect someone hacking into a computer server remotely while the disc was being used, or to prevent you from deleting important files.
21st century: TOKENIZATION & ENCRYPTION • Tokenization & Encryption are processes used to protect information in transit and at rest. It involves replacing or transforming the original text into a form that is unreadable to unauthorized people. • These techniques are used to safeguard sensitive information stored and processed in the cloud/internet, and on mobile and wireless devices.