Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.
THEHISTORYOFETHICALHACKING
TIMELINE1939-2014
THEFUTUREOFETHICALHACKING
The “bombe” becomes the world’s first
ethical hacki...
Prochain SlideShare
Chargement dans…5
×

The History of Ethical Hacking and Penetration Testing

12 251 vues

Publié le

When we think of hackers, the black hat variety usually comes to mind. However, white hat hacking, also known as "ethical hacking", has been around as early as the 1960's. Check out the infographic above to see how it all started, where it is today, and trends we expect to see in the near future.

Follow us on Twitter @installCore!

Check out our website: www.installcore.com

Publié dans : Logiciels, Technologie
  • ♥♥♥ http://scamcb.com/ezpayjobs/pdf
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • Visit this site: tinyurl.com/sexinarea and find sex in your area for one night)) You can find me on this site too)
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • I made $2,600 with this. I already have 7 days with this... ➤➤ https://tinyurl.com/realmoneystreams2019
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • Discover the secrets to getting a bigger penis naturally with this 100% free.  https://tinyurl.com/yaygh4xh
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici
  • Sex in your area for one night is there tinyurl.com/hotsexinarea Copy and paste link in your browser to visit a site)
       Répondre 
    Voulez-vous vraiment ?  Oui  Non
    Votre message apparaîtra ici

The History of Ethical Hacking and Penetration Testing

  1. 1. THEHISTORYOFETHICALHACKING TIMELINE1939-2014 THEFUTUREOFETHICALHACKING The “bombe” becomes the world’s first ethical hacking machine. It was used by the British to help decipher encrypted German messages during World War II. Computer “penetration” is first discussed by leading experts, with mention of deliberate tests by professionals. The first “tiger team” is formed. USAF contracted James Anderson to test time-sharing systems. The US Computer Fraud and Abuse Act makes black and gray hat hacking a criminal offense. The US Air Force conducts one of the first ethical hacks to test the security of the Multics operating system. The PTES is founded leading to an increase in ethical hacking jobs. They offer businesses and security service providers a common language and scope for performing penetration testing. 1939 1960 1971 1974 1986 1995 1999 2003 2009 2014 [1] https://www.trustwave.com/trustednews/2013/09/infographic-timeline-15-key-dates-ethical-hacking-history/ [2] http://www.businessinsider.com/google-paid-white-hat-hackers-more-than-15-million-dollars-2015-1#ixzz3UZIA71UG [3] http://en.wikipedia.org/wiki/Timeline_of_computer_security_hacker_history [4] http://www.codesandciphers.org.uk/virtualbp/tbombe/thebmb.htm [5] http://www.rsaconference.com/writable/presentations/file_upload/tech-w02-a-penetration-testing-model_v2.pdf [6] http://www.gartner.com/newsroom/id/2828722 Attacking your own defense to locate weaknesses has been around for over 1,500 years. Ethical hacking brings that practice into the digital world Google paid white hat hackers more than $1.5 million in 2014 to find bugs The term “ethical hacking” was first used by IBM’s John Patrick in 1995 The First Bug Bounty Program was launched by Netscape in 1995. Hackers were offered rewards for reporting vulnerabilites to the company before they could be exploited Dan Farmer and Wietse Venema release SATAN, an automated vulnerability scanner, which becomes a popular hacking tool. OWASP releases the first OWASP Testing Guide to help teach best practices in penetration testing. Worldwide enterprise security spending reaches $71.1B. Security executives begin to use on-demand penetration testing services for cost effective ethical hacking. Software security goes mainstream with Microsoft's Windows 98 release, 1999 becomes a banner year for security (and hacking). BUGBOUNTYPROGRAMSGROWINPOPULARITY FORMALGUIDELINES&PRACTICESDEVELOP CERTIFICATIONCOURSESBECOMETHENORM ETHICALHACKINGPRACTICESENTERIOTSPACE PTES Netscape 20142013 2015 $65.5B $71.1B $76.9B$75.9B

×