网络犯罪和网络安全的简史—— 1940 - 2020

embedded/2024/11/15 4:43:44/

注:机翻,未校对。


The History Of Cybercrime And Cybersecurity, 1940-2020

From phone phreaks to next generation cyberattacks

从电话攻击到下一代网络攻击

– Katie Chadd

Prague, Czech Republic – Nov. 30, 2020

From the 1940s to the present, discover how cybercrime and cybersecurity have developed to become what we know today.
从 1940 年代到现在,了解网络犯罪和网络安全如何发展成为我们今天所知道的。

Many species evolve in parallel, each seeking a competitive edge over the other. As cybersecurity and technology have evolved, so have criminals and ‘bad actors’ who seek to exploit weaknesses in the system for personal gain – or just to prove a point.
许多物种并行进化,每个物种都寻求优于其他物种的竞争优势。随着网络安全和技术的发展,犯罪分子和 “不良行为者” 也越来越多,他们试图利用系统中的弱点谋取私利,或者只是为了证明一个观点。

This arms race has been going on since the 1950s, and this article explains the evolution of cyberattacks and security solutions.
这场军备竞赛自 1950 年代以来一直在进行,本文解释了网络攻击和安全解决方案的演变。

1940s: The time before crime

For nearly two decades after the creation of the world’s first digital computer in [1943](https://www.computerhistory.org/timeline/computers/#:~:text=Started in 1943%2C the ENIAC,faster than any previous computer.), carrying out cyberattacks was tricky. Access to the giant electronic machines was limited to small numbers of people and they weren’t networked – only a few people knew how to work them so the threat was almost non-existent.
自 1943 年世界上第一台数字计算机问世以来的近二十年里,进行网络攻击一直很棘手。巨型电子机器的访问仅限于少数人,而且它们没有联网 —— 只有少数人知道如何操作它们,因此威胁几乎不存在。

Interestingly, the theory underlying computer viruses was first made public in 1949 when computer pioneer John von Neumann speculated that computer programs could reproduce.
有趣的是,计算机病毒背后的理论是在 1949 年首次公开的,当时计算机先驱约翰・冯・诺依曼(John von Neumann)推测计算机程序可以复制。

1950s: The phone phreaks

The technological and subcultural roots of hacking are as much related to early telephones as they are to computers.
黑客攻击的技术和文化根源与早期的电话有关,就像它们与计算机一样。

In the late 1950s, ‘phone phreaking’ emerged. The term captures several methods that ‘phreaks’ – people with a particular interest in the workings of phones – used to hijack the protocols that allowed telecoms engineers to work on the network remotely to make free calls and avoid long-distance tolls. Sadly for the phone companies, there was no way of stopping the phreaks, although the practice eventually died out in the 1980s.
在 1950 年代后期,“电话盗窃” 出现了。该术语涵盖了 “phreaks”(对手机工作特别感兴趣的人)用来劫持协议的几种方法,这些协议允许电信工程师在网络上远程工作以拨打免费电话并避免长途收费。可悲的是,对于电话公司来说,尽管这种做法最终在 1980 年代消失了,但无法阻止这些恶作剧。

The phreaks had become a community, even issuing newsletters, and included technological trailblazers like Apple’s founders Steve Wozniak and Steve Jobs. The mold was set for digital technology.
这些人已经成为一个社区,甚至发布时事通讯,其中包括苹果创始人史蒂夫・沃兹尼亚克(Steve Wozniak)和史蒂夫・乔布斯(Steve Jobs)等技术开拓者。模具是为数字技术设定的。

Igor Golovniov / Shutterstock.com
伊戈尔・戈洛夫尼奥夫 / Shutterstock.com

1960s: All quiet on the Western Front

The first-ever reference to malicious hacking was in the Massachusetts Institute of Technology’s student newspaper.
有史以来第一次提到恶意黑客攻击是在麻省理工学院的学生报纸上。

Even by the mid-1960s, most computers were huge mainframes, locked away in secure temperature-controlled rooms. These machines were very costly, so access – even to programmers – remained limited.
即使在 1960 年代中期,大多数计算机都是巨大的主机,被锁在安全的温控室中。这些机器非常昂贵,因此即使是程序员也能获得这些机器。

However, there were early forays into hacking by some of those with access, often students. At this stage, the attacks had no commercial or geopolitical benefits. Most hackers were curious mischief-makers or those who sought to improve existing systems by making them work more quickly or efficiently.
然而,一些有访问权限的人(通常是学生)很早就开始尝试黑客攻击。在这个阶段,这些攻击没有商业或地缘政治利益。大多数黑客都是好奇的恶作剧制造者,或者是那些试图通过使现有系统更快或更有效地工作来改进现有系统的人。

In 1967, IBM invited school kids to try out their new computer. After exploring the accessible parts of the system, the students worked to probe deeper, learning the system’s language, and gaining access to other parts of the system.
1967 年,IBM 邀请学童试用他们的新计算机。在探索了系统的可访问部分之后,学生们努力进行更深入的探索,学习系统的语言,并获得对系统其他部分的访问权。

This was a valuable lesson to the company and they acknowledged their gratitude to “a number of high school students for their compulsion to bomb the system”, which resulted in the development of defensive measures – and possibly the defensive mindset that would prove essential to developers from then on. Ethical hacking is still practiced today.
这对公司来说是一个宝贵的教训,他们承认对 “一些高中生强迫轰炸系统” 表示感谢,这导致了防御措施的发展 —— 可能还有从那时起对开发人员至关重要的防御思维方式。道德黑客攻击至今仍在进行。

As computers started to reduce in size and cost, many large companies invested in technologies to store and manage data and systems. Storing them under lock and key became redundant as more people needed access to them and passwords began to be used.
随着计算机的尺寸和成本开始减小,许多大公司投资于存储和管理数据和系统的技术。随着越来越多的人需要访问它们并且开始使用密码,将它们存储在锁和钥匙下变得多余。

Roman Belogorodov / Shutterstock.com
罗曼・别洛戈罗多夫 / Shutterstock.com

1970s: Computer security is born

Cybersecurity proper began in 1972 with a research project on ARPANET (The Advanced Research Projects Agency Network), a precursor to the internet.
网络安全始于 1972 年的一个研究项目 ARPANET(高级研究计划机构网络),这是互联网的前身。

ARPANET developed protocols for remote computer networking.
阿帕网开发了用于远程计算机网络的协议。

Researcher Bob Thomas created a computer program called Creeper that could move across ARPANET’s network, leaving a breadcrumb trail wherever it went. It read: ‘I’m the creeper, catch me if you can’. Ray Tomlinson – the inventor of email – wrote the program Reaper, which chased and deleted Creeper. Reaper was not only the very first example of antivirus software, but it was also the first self-replicating program, making it the first-ever computer worm.
研究员鲍勃・托马斯(Bob Thomas)创建了一个名为 Creeper 的计算机程序,该程序可以在 ARPANET 的网络上移动,无论它走到哪里都会留下面包屑痕迹。上面写着:“我是爬行者,如果你可以的话,抓住我”。雷・汤姆林森(Ray Tomlinson)—— 电子邮件的发明者 —— 编写了 “收割者” 程序,该程序追踪并删除了爬行者。Reaper 不仅是防病毒软件的第一个例子,而且还是第一个自我复制的程序,使其成为有史以来第一个计算机蠕虫。

An example of the Creeper’s taunting message. (Image credit: Core War)
爬行者嘲讽信息的一个例子。(图片来源:Core War)

Challenging the vulnerabilities in these emerging technologies became more important as more organizations were starting to use the telephone to create remote networks. Each piece of connected hardware presented a new ‘entry point’ and needed to be protected.
随着越来越多的组织开始使用电话来创建远程网络,挑战这些新兴技术中的漏洞变得更加重要。每个连接的硬件都呈现出一个新的 “入口点”,需要得到保护。

As reliance on computers increased and networking grew, it became clear to governments that security was essential, and unauthorized access to data and systems could be catastrophic. 1972-1974 witnessed a marked increase in discussions around computer security, mainly by academics in papers.
随着对计算机的依赖增加和网络的增长,政府清楚地认识到,安全性至关重要,未经授权访问数据和系统可能是灾难性的。1972-1974 年,围绕计算机安全的讨论明显增加,主要是学者们在论文中讨论。

Creating early computer security was undertaken by ESD and ARPA with the U.S. Air Force and other organizations that worked cooperatively to develop a design for a security kernel for the Honeywell Multics (HIS level 68) computer system. UCLA and the Stanford Research Institute worked on similar projects.
ESD 和 ARPA 与美国空军和其他组织合作开发了霍尼韦尔 Multics(HIS 68 级)计算机系统的安全内核设计,从而创建了早期的计算机安全性。加州大学洛杉矶分校(UCLA)和斯坦福研究所(Stanford Research Institute)也开展了类似的项目。

ARPA’s Protection Analysis project explored operating system security; identifying, where possible, automatable techniques for detecting vulnerabilities in software.
ARPA 的保护分析项目探讨了操作系统安全性;在可能的情况下,确定用于检测软件中漏洞的自动化技术。

By the mid-1970s, the concept of cybersecurity was maturing. In 1976 Operating System Structures to Support Security and Reliable Software stated:
到 1970 年代中期,网络安全的概念逐渐成熟。1976 年,支持安全性和可靠软件的操作系统结构指出:

“Security has become an important and challenging goal in the design of computer systems.”
“在计算机系统设计中,安全性已成为一个重要且具有挑战性的目标。”

In 1979, 16-year-old Kevin Mitnick famously hacked into The Ark – the computer at the Digital Equipment Corporation used for developing operating systems – and made copies of the software. He was arrested and jailed for what would be the first of several cyberattacks he conducted over the next few decades. Today he runs Mitnick Security Consulting.
1979 年,16 岁的凯文・米特尼克(Kevin Mitnick)闯入了数字设备公司(Digital Equipment Corporation)用于开发操作系统的计算机 “方舟”(The Ark),并复制了该软件。他被捕并入狱,因为这将是他在接下来的几十年里进行的几次网络攻击中的第一次。如今,他经营着 Mitnick 安全咨询公司。

Gennady Grechishkin / Shutterstock.com
根纳季・格雷奇什金 / Shutterstock.com

1980s: From ARPANET to internet

The 1980s brought an increase in high-profile attacks, including those at National CSS, AT&T, and Los Alamos National Laboratory. The movie War Games, in which a rogue computer program takes over nuclear missiles systems under the guise of a game, was released in 1983. This was the same year that the terms Trojan Horse and Computer Virus were first used.
1980 年代,备受瞩目的攻击有所增加,包括国家 CSS,AT&T 和洛斯阿拉莫斯国家实验室的攻击。电影《战争游戏》于 1983 年上映,其中流氓计算机程序以游戏为幌子接管了核导弹系统。同年,特洛伊木马和计算机病毒这两个术语首次被使用。

At the time of the Cold War, the threat of cyber espionage evolved. In 1985, The US Department of Defense published the Trusted Computer System Evaluation Criteria (aka The Orange Book) that provided guidance on:
在冷战时期,网络间谍活动的威胁发生了变化。1985 年,美国国防部发布了《可信计算机系统评估标准》(又名《橙皮书》),为以下方面提供了指导:

  • Assessing the degree of trust that can be placed in software that processes classified or other sensitive information
    评估可以对处理机密信息或其他敏感信息的软件施加的信任程度
  • What security measures manufacturers needed to build into their commercial products.
    制造商需要在其商业产品中内置哪些安全措施。

Despite this, in 1986, German hacker Marcus Hess used an internet gateway in Berkeley, CA, to piggyback onto the ARPANET. He hacked 400 military computers, including mainframes at the Pentagon, intending to sell information to the KGB.
尽管如此,在 1986 年,德国黑客马库斯・赫斯(Marcus Hess)使用加利福尼亚州伯克利的一个互联网网关捎带上了阿帕网。他入侵了 400 台军用计算机,包括五角大楼的大型机,打算向克格勃出售信息。

Security started to be taken more seriously. Savvy users quickly learned to monitor the command.com file size, having noticed that an increase in size was the first sign of potential infection. Cybersecurity measures incorporated this thinking, and a sudden reduction in free operating memory remains a sign of attack to this day.
安全性开始受到更加重视。精明的用户很快就学会了监控 command.com 文件大小,因为他们注意到大小的增加是潜在感染的第一个迹象。网络安全措施采纳了这一思想,直到今天,免费操作内存的突然减少仍然是攻击的标志。

1987: The birth of cybersecurity

1987 was the birth year of commercial antivirus, although there are competing claims for the innovator of the first antivirus product.
1987 年是商业防病毒软件的诞生之年,尽管对第一款防病毒产品的创新者存在相互竞争的说法。

  • Andreas Lüning and Kai Figge released their first antivirus product for the Atari ST – which also saw the release of Ultimate Virus Killer (UVK)
    Andreas Lüning 和 Kai Figge 为 Atari ST 发布了他们的第一款防病毒产品 —— 该产品还发布了 Ultimate Virus Killer (UVK)
  • Three Czechoslovakians created the first version of NOD antivirus
    三个捷克斯洛伐克人创建了 NOD 防病毒软件的第一个版本
  • In the U.S., John McAfee founded McAfee (now part of Intel Security), and released VirusScan.
    在美国,约翰・麦卡菲(John McAfee)创立了迈克菲(McAfee,现为 Intel Security 的一部分),并发布了 VirusScan。

Also in 1987: 同样在 1987 年:

  • One of the earliest documented ‘in the wild’ virus removals was performed by German Bernd Fix when he neutralized the infamous Vienna virus – an early example of malware that spread and corrupted files.
    最早记录在案的 “野外” 病毒清除之一是由德国人 Bernd Fix 执行的,当时他中和了臭名昭著的维也纳病毒 —— 这是传播和破坏文件的恶意软件的早期例子。
  • The encrypted Cascade virus, which infected .COM files, first appeared .A year later, Cascade caused a serious incident in IBM’s Belgian office and served as the impetus for IBM’s antivirus product development. Before this, any antivirus solutions developed at IBM had been intended for internal use only.
    感染.COM 文件的加密级联病毒首次出现。一年后,Cascade 在 IBM 的比利时办事处引发了一起严重事件,并成为 IBM 防病毒产品开发的推动力。在此之前,IBM 开发的任何防病毒解决方案仅供内部使用。

The Cascade virus made text ‘fall’ to the bottom of the screen
Cascade 病毒使文本 “掉落” 到屏幕底部

By 1988, many antivirus companies had been established around the world – including Avast, which was founded by Eduard Kučera and Pavel Baudiš in Prague, Czech Republic. Today, Avast has a team of more than 1,700 worldwide and stops around 1.5 billion attacks every month.
到 1988 年,世界各地已经成立了许多防病毒公司,其中包括由 Eduard Kučera 和 Pavel Baudiš 在捷克共和国布拉格创立的 Avast。如今,Avast 在全球拥有 1,700 多人的团队,每月阻止约 15 亿次攻击。

Early antivirus software consisted of simple scanners that performed context searches to detect unique virus code sequences. Many of these scanners also included ‘immunizers’ that modified programs to make viruses think the computer was already infected and not attack them. As the number of viruses increased into the hundreds, immunizers quickly became ineffective.
早期的防病毒软件由简单的扫描程序组成,这些扫描程序执行上下文搜索以检测独特的病毒代码序列。其中许多扫描仪还包括 “免疫器”,这些程序可以修改程序,使病毒认为计算机已经被感染,而不是攻击它们。随着病毒数量增加到数百种,免疫接种者很快就变得无效。

It was also becoming clear to antivirus companies that they could only react to existing attacks, and a lack of a universal and ubiquitous network (the internet) made updates hard to deploy.
防病毒公司也越来越清楚,他们只能对现有的攻击做出反应,而缺乏通用且无处不在的网络(互联网)使得更新难以部署。

As the world slowly started to take notice of computer viruses, 1988 also witnessed the first electronic forum devoted to antivirus security – Virus-L – on the Usenet network. The decade also saw the birth of the antivirus press: UK-based Sophos-sponsored Virus Bulletin and Dr. Solomon’s Virus Fax International.
随着世界慢慢开始注意到计算机病毒,1988 年也见证了 Usenet 网络上第一个致力于防病毒安全的电子论坛 - Virus-L。这十年还见证了防病毒出版社的诞生:总部位于英国的 Sophos 赞助的 Virus Bulletin 和 Dr. Solomon’s Virus Fax International。

The decade closed with more additions to the cybersecurity market, including F-Prot, ThunderBYTE, and Norman Virus Control. In 1989, IBM finally commercialized their internal antivirus project and IBM Virscan for MS-DOS went on sale for $35.
十年结束时,网络安全市场增加了更多新成员,包括 F-Prot、ThunderBYTE 和 Norman Virus Control。1989 年,IBM 终于将其内部防病毒项目商业化,IBM Virscan for MS-DOS 以 35 美元的价格上市销售。

Further reading: For more nostalgia, check out our guide to the best hardware of the 1980s.
进一步阅读: 如需更多怀旧之情,请查看我们的 1980 年代最佳硬件指南。

1990s: The world goes online

1990 was quite a year:
1990 年是相当重要的一年:

  • The first polymorphic viruses were created (code that mutates while keeping the original algorithm intact to avoid detection)
    创建了第一个多态病毒(在保持原始算法不变以避免检测的情况下发生变异的代码)
  • British computer magazine PC Today released an edition with a free disc that ‘accidentally’ contained the DiskKiller virus, infecting tens of thousands of computers
    英国计算机杂志《PC Today》发布了一个带有免费光盘的版本,该光盘 “意外” 包含了 DiskKiller 病毒,感染了数以万计的计算机
  • EICAR (European Institute for Computer Antivirus Research) was established
    EICAR(欧洲计算机防病毒研究所)成立

Early antivirus was purely signature-based, comparing binaries on a system with a database of virus ‘signatures’. This meant that early antivirus produced many false positives and used a lot of computational power – which frustrated users as productivity slowed.
早期的防病毒软件纯粹是基于签名的,将系统上的二进制文件与病毒 “签名” 数据库进行比较。这意味着早期的防病毒软件会产生许多误报并使用大量的计算能力 —— 随着生产力的降低,这让用户感到沮丧。

As more antivirus scanners hit the market, cybercriminals were responding and in 1992 the first anti-antivirus program appeared.
随着越来越多的防病毒扫描程序进入市场,网络犯罪分子正在做出反应,并于 1992 年出现了第一个防病毒程序。

By 1996, many viruses used new techniques and innovative methods, including stealth capability, polymorphism, and ‘macro viruses’, posing a new set of challenges for antivirus vendors who had to develop new detection and removal capabilities.
到 1996 年,许多病毒使用了新技术和创新方法,包括隐身能力、多态性和 “巨集病毒”,这给必须开发新的检测和移除功能的防病毒供应商带来了一系列新的挑战。

New virus and malware numbers exploded in the 1990s, from tens of thousands early in the decade growing to 5 million every year by 2007. By the mid-‘90s, it was clear that cybersecurity had to be mass-produced to protect the public. One NASA researcher developed the first firewall program, modeling it on the physical structures that prevent the spread of actual fires in buildings.
新的病毒和恶意软件数量在 1990 年代激增,从本世纪初的数万增长到 2007 年的每年 500 万。到 90 年代中期,很明显,网络安全必须大规模生产以保护公众。美国宇航局的一位研究人员开发了第一个防火墙程序,将其建模在物理结构上,以防止建筑物中实际火灾的蔓延。

The late 1990s were also marked by conflict and friction between antivirus developers:
1990 年代后期,防病毒开发人员之间的冲突和摩擦也随之而来:

  • McAfee accused Dr. Solomon’s of cheating so that testing of uninfected discs showed good speed results and the scan tests of virus collections showed good detection results. Dr. Solomon’s filed suit in response
    McAfee 指责 Dr. Solomon’s 作弊,因此对未感染光盘的测试显示出良好的速度结果,而对病毒集合的扫描测试显示出良好的检测结果。所罗门博士提起诉讼作为回应
  • Taiwanese developer Trend Micro accused McAfee and Symantec of violating its patent on virus scan-checking technology via the internet and electronic mail. Symantec then accused McAfee of using code from Symantec’s Norton AntiVirus.
    台湾开发商趋势科技(Trend Micro)指控麦卡菲(McAfee)和赛门铁克(Symantec)通过互联网和电子邮件侵犯了其病毒扫描检查技术的专利。赛门铁克随后指责麦卡菲使用了赛门铁克的诺顿防病毒软件中的代码。

Heuristic detection also emerged as a new method to tackle the huge number of virus variants. Antivirus scanners started to use generic signatures – often containing non-contiguous code and using wildcard characters – to detect viruses even if the threat had been ‘hidden’ inside meaningless code.
启发式检测也成为一种处理大量病毒变种的新方法。防病毒扫描程序开始使用通用签名(通常包含不连续的代码并使用通配符)来检测病毒,即使威胁已 “隐藏” 在无意义的代码中。

Email: a blessing and a curse
电子邮件:祝福和诅咒

Towards the end of the 1990s, email was proliferating and while it promised to revolutionize communication, it also opened up a new entry point for viruses.
到 1990 年代末,电子邮件激增,虽然它有望彻底改变通信,但它也为病毒开辟了新的切入点。

In 1999, the Melissa virus was unleashed. It entered the user’s computer via a Word document and then emailed copies of itself to the first 50 email addresses in Microsoft Outlook. It remains one of the fastest spreading viruses and the damage cost around $80 million to fix.
1999 年,梅丽莎病毒被释放。它通过 Word 文档进入用户的计算机,然后将自己的副本通过电子邮件发送到 Microsoft Outlook 中的前 50 个电子邮件地址。它仍然是传播最快的病毒之一,修复损失的成本约为 8000 万美元。

2000s: Threats diversify and multiply

With the internet available in more homes and offices across the globe, cybercriminals had more devices and software vulnerabilities to exploit than ever before. And, as more and more data was being kept digitally, there was more to plunder.
随着全球越来越多的家庭和办公室可以使用互联网,网络犯罪分子比以往任何时候都有更多的设备和软件漏洞可供利用。而且,随着越来越多的数据以数字方式保存,有更多的数据可以掠夺。

In 2001, a new infection technique appeared: users no longer needed to download files – visiting an infected website was enough as bad actors replaced clean pages with infected ones or ‘hid’ malware on legitimate webpages. Instant messaging services also began to get attacked, and worms designed to propagate via IRC (Internet Chat Relay) channel also arrived.
2001 年,出现了一种新的感染技术:用户不再需要下载文件 —— 访问受感染的网站就足够了,因为不良行为者用受感染的页面替换干净的页面或在合法网页上 “隐藏” 恶意软件。即时通讯服务也开始受到攻击,旨在通过 IRC(Internet Chat Relay)通道传播的蠕虫也出现了。

The development of zero-day attacks, which make use of ‘holes’ in security measures for new software and applications, meant that antivirus was becoming less effective – you can’t check code against existing attack signatures unless the virus already exists in the database. Computer magazine c’t found that detection rates for zero-day threats had dropped from 40-50% in 2006 to only 20-30% in 2007.
零日攻击的发展,利用新软件和应用程序安全措施中的 “漏洞”,意味着防病毒软件的有效性越来越低 —— 除非病毒已经存在于数据库中,否则你无法根据现有的攻击签名检查代码。计算机杂志 ct 发现,零日威胁的检测率从 2006 年的 40-50% 下降到 2007 年的 20-30%。

As crime organizations started to heavily fund professional cyberattacks, the good guys were hot on their trail:
随着犯罪组织开始大量资助专业网络攻击,好人们紧随其后:

  • 2000: the first open-source antivirus engine OpenAntivirus Project is made available
    2000 年:第一个开源防病毒引擎 OpenAntivirus Project 问世
  • 2001: ClamAV is launched, the first-ever open-source antivirus engine to be commercialized
    2001 年:推出 ClamAV,这是有史以来第一个商业化的开源防病毒引擎
  • 2001: Avast launches free antivirus software, offering a fully-featured security solution to the masses. The initiative grew the Avast user base to more than 20 million in five years.
    2001 年:Avast 推出免费防病毒软件,为大众提供功能齐全的安全解决方案。该计划在五年内将 Avast 用户群扩大到 2000 多万。

A key challenge of antivirus is that it can often slow a computer’s performance. One solution to this was to move the software off the computer and into the cloud. In 2007, Panda Security combined cloud technology with threat intelligence in their antivirus product – an industry-first. McAfee Labs followed suit in 2008, adding cloud-based anti-malware functionality to VirusScan. The following year, the Anti-Malware Testing Standards Organization (AMTSO) was created and started working shortly after on a method of testing cloud products.
防病毒软件的一个关键挑战是它通常会降低计算机的性能。一种解决方案是将软件从计算机移至云端。2007 年,Panda Security 在其防病毒产品中将云技术与威胁情报相结合,这在业界尚属首创。McAfee Labs 在 2008 年紧随其后,向 VirusScan 添加了基于云的反恶意软件功能。次年,反恶意软件测试标准组织 (AMTSO) 成立,并在不久后开始研究一种测试云产品的方法。

Another innovation this decade was OS security – cybersecurity that’s built into the operating system, providing an additional layer of protection. This often includes performing regular OS patch updates, installation of updated antivirus engines and software, firewalls, and secure accounts with user management.
这十年来的另一项创新是操作系统安全性 —— 内置于操作系统中的网络安全,提供额外的保护层。这通常包括执行定期操作系统补丁更新、安装更新的防病毒引擎和软件、防火墙以及具有用户管理功能的安全帐户。

With the proliferation of smartphones, antivirus was also developed for Android and Windows mobile.
随着智能手机的普及,还为 Android 和 Windows Mobile 开发了防病毒软件。

2010s: The next generation

The 2010s saw many high-profile breaches and attacks starting to impact the national security of countries and cost businesses millions.
2010 年代,许多备受瞩目的违规和攻击开始影响各国的国家安全,并使企业损失数百万美元。

  • 2012: Saudi hacker 0XOMAR publishes the details of more than 400,000 credit cards online
    2012 年:沙特黑客 0XOMAR 在线发布了超过 400,000 张信用卡的详细信息
  • 2013: Former CIA employee for the US Government Edward Snowden copied and leaked classified information from the National Security Agency (NSA)
    2013 年:美国政府前中央情报局雇员爱德华・斯诺登(Edward Snowden)复制并泄露了国家安全局(NSA)的机密信息
  • 2013-2014: Malicious hackers broke into Yahoo, compromising the accounts and personal information of its 3 billion users. Yahoo was subsequently fined $35 million for failing to disclose the news
    2013-2014 年:恶意黑客闯入雅虎,破坏了其 30 亿用户的帐户和个人信息。雅虎随后因未能披露这一消息而被罚款 3500 万美元
  • 2017: WannaCry ransomware infects 230,000 computers in one day
    2017 年:WannaCry 勒索软件在一天内感染了 230,000 台计算机
  • 2019: Multiple DDoS attacks forced New Zealand’s stock market to temporarily shut down
    2019 年:多次 DDoS 攻击迫使新西兰股市暂时关闭

The increasing connectedness and the ongoing digitization of many aspects of life continued to offer cybercriminals new opportunities to exploit. Cybersecurity tailored specifically to the needs of businesses became more prominent and in 2011, Avast launched its first business product.
日益增长的联系和生活许多方面的持续数字化继续为网络犯罪分子提供新的利用机会。专门针对企业需求量身定制的网络安全变得更加突出,2011 年,Avast 推出了其第一款商业产品。

As cybersecurity developed to tackle the expanding range of attack types, criminals responded with their own innovations: multi-vector attacks and social engineering. Attackers were becoming smarter and antivirus was forced to shift away from signature-based methods of detection to ‘next generation’ innovations.
随着网络安全的发展以应对不断扩大的攻击类型,犯罪分子以他们自己的创新作为回应:多向量攻击和社会工程。攻击者变得越来越聪明,防病毒软件被迫从基于签名的检测方法转向 “下一代” 创新。

Next-gen cybersecurity uses different approaches to increase detection of new and unprecedented threats, while also reducing the number of false positives. It typically involves:
下一代网络安全使用不同的方法来增加对新的和前所未有的威胁的检测,同时减少误报的数量。它通常涉及:

  • Multi-factor authentication (MFA)
    多重身份验证 (MFA)
  • Network Behavioural Analysis (NBA) – identifying malicious files based on behavioral deviations or anomalies
    网络行为分析 (NBA) – 根据行为偏差或异常识别恶意文件
  • Threat intelligence and update automation
    威胁情报和更新自动化
  • Real-time protection – also referred to as on-access scanning, background guard, resident shield and auto-protect
    实时保护 – 也称为按访问扫描、后台防护、驻留防护和自动保护
  • Sandboxing – creating an isolated test environment where you can execute a suspicious file or URL
    沙盒 – 创建一个隔离的测试环境,您可以在其中执行可疑文件或 URL
  • Forensics – replaying attacks to help security teams better mitigate future breaches
    取证 – 重放攻击,帮助安全团队更好地缓解未来的违规行为
  • Back-up and mirroring
    备份和镜像
  • Web application firewalls (WAF) – protecting against cross-site forgery, cross-site-scripting (XSS), file inclusion, and SQL injection.
    Web 应用程序防火墙 (WAF) – 防止跨站点伪造、跨站点脚本 (XSS)、文件包含和 SQL 注入。

Who knows what the next decade will bring? Whatever happens, Avast Business will be there to provide advanced protection for organizations and offer peace of mind for business leaders and IT professionals. Learn more about our range of solutions and find which one is best suited for your business using our Help Me Choose tool.
谁知道下一个十年会带来什么?无论发生什么情况,Avast Business 都将为组织提供高级保护,并为业务领导者和 IT 专业人员提供安心。详细了解我们的解决方案范围,并使用我们的 “帮助我选择” 工具找到最适合您业务的解决方案。


via:

  • The History Of Cybercrime And Cybersecurity, 1940-2020

    https://cybersecurityventures.com/the-history-of-cybercrime-and-cybersecurity-1940-2020/


http://www.ppmy.cn/embedded/88344.html

相关文章

C++ 列式内存布局数据存储格式 Arrow

Apache Arrow 优点 : 高性能数据处理: Arrow 使用列式内存布局,这特别适合于数据分析和查询操作,因为它允许对数据进行高效批量处理,减少CPU缓存未命中,从而提升处理速度。 零拷贝数据共享: Arrow …

python3.12 搭建MinerU 环境遇到的问题解决

报错: AttributeError: module pkgutil has no attribute ImpImporter. Did you mean: zipimporter? ERROR: Exception: Traceback (most recent call last):File "D:\ipa_workspace\MinerU\Lib\site-packages\pip\_internal\cli\base_command.py", …

Http高级interview

1、Http https区别 1、https协议需要到ca申请证书,一般免费证书较少,因而需要一定费用。 2、http是超文本传输协议,信息是明文传输,https则是具有安全性的ssl加密传输协议。 3、http和https使用的是完全不同的连接方式&#xf…

记录一个k8s集群zookeeper部署过程

由于网管中心交维要求必须是支持高可用配置,原先单节点的zookeeper不被允许。所以在k8s集群中做了一个高可用版本的zookeeper。 期间有点小波折,官方给的镜像版本太老,业务不支持,所以手动做了下处理,重新打了一个镜像…

SQL labs-SQL注入(三,sqlmap使用)

本文仅作为学习参考使用,本文作者对任何使用本文进行渗透攻击破坏不负任何责任。 引言: 盲注简述:是在没有回显得情况下采用的注入方式,分为布尔盲注和时间盲注。 布尔盲注:布尔仅有两种形式,ture&#…

【BES2500x系列 -- RTX5操作系统】系统执行流程 -- 引导程序(boot loader)--(十)

💌 所属专栏:【BES2500x系列】 😀 作  者:我是夜阑的狗🐶 🚀 个人简介:一个正在努力学技术的CV工程师,专注基础和实战分享 ,欢迎咨询! &#x1f49…

python opencv 绘制多边形 闭合

示例 假设有四个点:(x1, y1), (x2, y2), (x3, y3), (x4, y4)。 不闭合的多边形 如果 isClosed 参数设置为 False,cv2.polylines 将绘制三根线段,连接前三个点,而不会将最后一个点与第一个点连接起来。 python import cv2 impo…

nvidia系列教程-AGX-Orin基础环境搭建

目录 前言 一、Agx-Orin(32GB)介绍 1.1 GPU 1.2 CPU 1.3 NVDLA(NVIDIA Deep Learning Accelerator) 1.4 内存 1.5 存储 二、安装JetPack SDK 三、基础环境配置 四、jetpack软件版本 总结 前言 NVIDIA Jetson AGX Orin 是…