StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The History of Information Security - Term Paper Example

Cite this document
Summary
The following paper under the title 'The History of Information Security' gives detailed information about security that has developed to become a crucial need for all information operations due to the rapid rise of information hackers and attackers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.8% of users find it useful
The History of Information Security
Read Text Preview

Extract of sample "The History of Information Security"

The History of Information Security from Ancient Egypt to Present day Information security has developed to become a crucial need for all information operations due to the rapid rise of information hackers and attackers. The history of information security stretches back to ancient periods, and it began with the creation of a bureaucracy in the administration competition. Aspects like interference of the encrypted messages drew much attention during the First World War, whereas other important aspects have remained considerably not covered. The traditional information security techniques that were used in ancient Egypt such data hiding, watermarking and cryptography, are some of the basic notions, and they do play a significant role in the development of the information security sector algorithms and solutions. New trend in information security includes biometric technologies deliver good security levels nowadays. It is easy to combine the traditional techniques with biometrics so as to realize much resilient security levels. The field of technology in line with information security has continued to develop in leaps since the ancient times (Blackwood 396). Despite the fact that not all companies or organizations have been in a position to embrace the latest security systems, information security will surely grow to a greater height. Information security is a concept that is broad than technology. It involves protecting information and relevant information systems from access that is not authorized or use, disclose, disrupt and destroy vital information. There has never been some struggle or effort to come up with an all-inclusive history regarding information security (Blackwood 97). This is quite unfortunate simply because information security should be taken as a set of vessels that are communicating, where the technical inventions can make the prevailing organizational frame-works obsolescent, and a failure of political authority may lead to a special dependence on the technical means. The aim of this paper is to critically analyze the history of information security from Ancient Egypt to present day. Egypt is one of the most talked about civilizations in the world. Ranging from its quest for development in agriculture, trade, and industry, the country had also a great interest in technological development especially in information security. The development of the forms of information security in Egypt has been stepwise. One main form that was used is encryption. This is the process of converting messages or data into a form that is not readable to any person except apart from the intended recipient of the information. The data which is encrypted must be decrypted before it can be seen by the recipient. In its earliest form, the Egyptians attempted to conceal vital information which they wanted to preserve for their own possession by replacing some portions of the information with some symbols, pictures or numbers. It is in 1900 BC that the ancient Egyptian scribes started to use encryption in transferring information from one place to another. Encryption is still used in modern day life. It is mainly used in transactions that are carried out over insecure communication channels like the internet. This method is also used to protect data that is being transmitted between digital devices such as the automatic teller machines and the mobile telephones. Additionally, encryption is employed in the development of digital signatures that allow some messages to be authenticated. Another method that was used in information security in Ancient Egypt is cryptography. The earliest recognized texts contained some components of cryptography first originated in an Egyptian known as Menet Khufu more than 4000 years ago on the tomb of a nobleman called Khnumhotep II. In around 1900 BC, one of his scribes drew the master’s life in the tomb. It is during this time that he used a number of symbols that were unusual in order to obscure the meaning of the writings (Singh 523). This method was an example of a substitution cipher whereby a cipher system takes the place one character for another. With the evolution of the Egyptian culture, hieroglyphic substitution grew to become more common. This method of encryption was preferred simply because it was easy for those who could read and write. The Egyptian used this encryption system because they strived to preserve the sacred nature of their religious customs. With cryptography, the scribes desired to give the appearance that is formal to their writings (Singh 536). This is almost similar to the formal, complicated language that is used a modern legal document. The Egyptian cryptography could also be considered as a way the scribes used to influence others by displaying they could write at an advanced level. The art of cryptography did not show any major advancements until in the Middle Ages. By that period, this art had spread from Egypt to other European countries who utilized cryptography in one way or another (Singh 412). This form of information security was mainly used by the ambassadors to keep in touch with each other. In modern times, the key technique of cryptography has realized wide adoption. The use of a mutual key and a secretive key held only by the sender has been in use today mainly as a form of unbalanced encryption. One of the main uses of this method is for the sender to practice the private key to encode the information and then the person who receives the message will use the public key to decode it. In this way, the person who receives the message will know the sender of the message. This method is widely regarded as the mainstay of the digital signature. The problem only arises when communications between many organizations necessitate the use of a number of public keys. Nevertheless, no matter the method that is employed, a combination of many methods will yield the best results. In no doubt, cryptography has played a key role in the development and streamlining of data integrity in many communities and cultures. While history may tend to bring out a different picture, the statement that winners often develop a good history is worth noting. By its nature, cryptography recommends secrecy and misdirection. With technology advancements today, information security in Egypt and the world at large is an emerging sector that is undergoing substantial change. The main suppliers that are influencing the information security industry include groups of technology dealers, consultants, system integrators, and defense companies. The market research that is available does not give the correct consensus of the information security market. Unlike in the ancient times, information security necessities will be motivated by a number of macro level factors over the coming decades. These factors include climate change, regulation, evolving demographics, and globalization. These factors are likely to present numerous opportunities to organizations that are currently dealing with issues that are related with information security and the companies that provide services that deal with information security (Lehtinen 312). Because of this, there has been a greater extent of subdivision within the information security market. For instance, rapid rise of importance in information security like the healthcare sector will drive technological requirements. In addition to that, the heavy expectations that come with securing any company’s information, the government and many institutions in the world at large are employing information security analysts. These specialists are accountable for taking care of all the data and the communications that are stored and shared in multiple computer network systems (Lehtinen 156). For example in the financial industry, the security analysts are required to continually renovate the firewalls which are responsible for prohibiting access to some sensitive information, and they must perform the required tests to ensure that the system is of high integrity, and no unauthorized persons will access the vital information. In conclusion, the development and approaches to information security have really developed since those days of ancient Egypt to date and Egypt should be credited for such innovations. These advancements have gone to revolutionize the information and the way in which it is handled in the modern world. The increasing focus in information security has provided a competitive advantage as the organizations have known that effective information security will increase the number of customers to use their products. Organizations should consider the potential benefits and the costs that come with information security. Information security should be upheld and be supported as this area continues to develop in the future. Works cited Lehtinen, Rick, and Gangemi Sr. Computer Security Basics. Sebastopol: OReilly Media, 2011. Singh, Simon. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. New York: Anchor Books, 2000. Blackwood, Gary L, and Jason Henry. Mysterious Messages: A History of Codes and Ciphers. New York, N.Y: Dutton Childrens Books, 2009. http://www.fknbih.edu/Portals/0/Nastavnici-dokumenti/Budimlic%20M/Kiberneticki%20kriminalitet/A_InformationSecurity2020_Bernik.pdf http://content.hccfl.edu/pollock/AUnixSec/InfoSecOverview.htm Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The History of Information Security Term Paper Example | Topics and Well Written Essays - 1250 words, n.d.)
The History of Information Security Term Paper Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/information-technology/1819290-the-history-of-information-security-from-ancient-egypt-to-present-day
(The History of Information Security Term Paper Example | Topics and Well Written Essays - 1250 Words)
The History of Information Security Term Paper Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1819290-the-history-of-information-security-from-ancient-egypt-to-present-day.
“The History of Information Security Term Paper Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/information-technology/1819290-the-history-of-information-security-from-ancient-egypt-to-present-day.
  • Cited: 0 times

CHECK THESE SAMPLES OF The History of Information Security

The Pros and Cons of Using Encryption as a Key Technological Solution to Corporate Security

In this scenario, the information security is offered on computers and over the Internet through a multiplicity of techniques.... Application of Encryption Encryption is technique of translation of information and data into a clandestine code.... Moreover, the encryption can be employed to offer high level security to e-mail, network communication, data and information stored on hard drives or any portable or mobile disks, as well as other information that necessitates safety (Cook, 2000)....
4 Pages (1000 words) Essay

Public-key cryptography and information security

Consequently, it reduces the extensive need for the human resource to effectively manage the process of information security management.... PUBLIC-KEY CRYPTOGRAPHY AND information security Public-Key cryptography and information security Affiliation Public Key Cryptography (PKC) uses a key with two elements, a "public key" and a "private key", for the implementation of an encryption algorithm that doesn't require two parties (sender and receiver) to first exchange a secret key in an attempt to carry out the process of communication....
2 Pages (500 words) Essay

A Security Plan of the University

security PLAN Introduction A security plan is process through which an individual or organization formulates policies that can be used to ensure availability security.... Before coming up with a security plan a risk has to be identified, for instance a school can decide to come up with a security plan in order to protect property like computers.... hellip; This report focuses on the security plan that North Carolina agricultural and state university came up with to protect the university resources especially computers in order to promote quality in computer systems and attain the universities goals....
8 Pages (2000 words) Essay

Inter to accounting

The announcement made through the Australia security Exchange press made information available to both investors and members of the public.... Residual returns of MYG Source: (Austailia security Exchange, 2011) Trend analysis of share closing prices of Mutiny Gold Limited, The share prices immediately after the announcement increased by 0.... Source; (Austailia security Exchange, 2011).... The residuals returns did not improve, since the company announcement did not change the potential investor's perspective (Austailia security Exchange, 2011)....
4 Pages (1000 words) Research Paper

The Disclosure of Sensitive and Classified Information by Persons

hellip; Intelligence is always based on secrets, but the US press is an open crypt of information about the US intelligence sources.... The disclosure of sensitive and classified information by persons currently or previously employed by or affiliated with the United States federal government for personal or political gain greatly harms the country's national security.... Being not an ordinary citizen, you are of the key persons of the country to keep in-charge of the national security of the United States....
6 Pages (1500 words) Research Paper

Security Service

This essay "security Service" is about the body that is charged with the responsibility of ensuring the security of the UK citizens.... nbsp;The security service is a composition of several coordinated roles that are mandated to ensure that security is prevalent within the nation.... hellip; The United Kingdom security services include patrols, monitoring, and defense against external aggression.... The security service of the United Kingdom is divided into two main apparatus....
11 Pages (2750 words) Essay

Overview and History of the Dam Sector

It also serves as a private section interface with the federal government over issues associated with dam's security, levees, and locks.... The sector of GCC acts like the government partner and counterpart of the SCC to implement, execute and plan wide sector security programs.... The sector through guiding and fostering research in implementation and development of enhancing technologies and proactive measures will make sure that there are continued enjoyment and economic use of this resource via risk management framework that addresses recovery, mitigation, and response (Critical Infrastructure Partnership Advisory Council, 2011) Challenges The challenges that are inherent in the sector are:The poor condition of the infrastructure Cyber insecurity due to information sharing Having constraints in the funding of the project ...
1 Pages (250 words) Assignment

Security Essentials 4.4

A slippery perimeter wall Indian Level Prison The Indian level prison was established in 1860 by the Indian security department to curb rising insecurity in India.... The security officers manage the prisoner's accounts with an aim of rehabilitating the convict appropriately.... The security system ranging from the buildings to the surveillance cameras are designed to prevent escapes.... Workplace security essentials: A guide for helping organizations creates safe work environments....
2 Pages (500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us