1 / 10

Evolution of Security: From Rocks to Encryption

Explore the history of security, from cavemen using rocks to modern encryption techniques. Learn about guard dogs, moats, security guards, alarms, military code, vaults, and tokenization & encryption.

vmyers
Download Presentation

Evolution of Security: From Rocks to Encryption

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. THE HISTORY OF SECURITY By: Imelda Reyes

  2. STONE AGE • Cravemen originally used rocks, fruit, branches, and other natural resources to keep the predators away and to keep away from harm’s way. • Eventually, the cave people created spears, bow and arrows, and slingshots to hunt for food and to be able to survive.

  3. 30,000 BC: GUARD DOGS • Before parents would feel a sense of security when a guard dog was beside their child. They felt the dog protected the baby. • Orphaned wolf pups were rescued by humans and reared alongside babies. • People also felt safe around guard dogs because they knew they were protected from any harm.

  4. 3150 BC: MOAT AROUND CASTLE • A moat, the large trench or ditch surrounding a castle, was first created to protect the fortress during dangerous times. • First line of defense in keeping people secure.

  5. 1760-1840: SECURITY GUARDS • During the Industrial Revolution a lot of people began to employ the services of security guards for personal protection. • Today many businesses, such as banks and schools, employ security guards for protection.

  6. 1850's: HOME SECURITY SYSTEMS/ALARMS • In 1853, the first patent on electro-magnetic alarms meant that businesses and wealthy residents could secure valuables. • Magnetic contacts were installed on the windows and doors that, when tripped, would send a signal through the electromagnetic wiring and sound an alarm. • These groundbreaking security systems were effective in preventing break-ins from occurring.

  7. 1800's-1900's: MILITARY CODE • Cryptography was a common form of codemaking and codebreaking during the Civil War. • It was used to secure what was going on during the war.

  8. 18th & 19th century: VAULTS • Vaults began to appear in banks, large businesses, casinos, schools, and military buildings to store intellectual property, money, or even dangerous objects. • They are use to protect people’s valuable things.

  9. 1990's: WRITE-PROTCTION ON FLOPPY DISCS • Floppy discs were used to protect someone hacking into a computer server remotely while the disc was being used, or to prevent you from deleting important files.

  10. 21st century: TOKENIZATION & ENCRYPTION • Tokenization & Encryption are processes used to protect information in transit and at rest. It involves replacing or transforming the original text into a form that is unreadable to unauthorized people. • These techniques are used to safeguard sensitive information stored and processed in the cloud/internet, and on mobile and wireless devices.

More Related