industryThe ARPANET Era (1971-1989) Monthly Overview

    The Cybersecurity Landscape in February 1987: Foundations of a New Era

    Monday, February 2, 1987

    In February 1987, the cybersecurity landscape looked like this: The field of cybersecurity was beginning to take shape, influenced by a series of significant developments and cultural shifts from the previous years. The early 1980s had seen the rise of the hacker culture, significantly fueled by the 1983 film WarGames, which brought the idea of hacking into the mainstream consciousness. This cultural phenomenon not only popularized the concept of computer hacking but also raised public awareness about the potential vulnerabilities of computer systems.

    By this time, academic research into computer security was gaining traction. Institutions were beginning to recognize the importance of cybersecurity, as evidenced by the founding of the Computer Emergency Response Team (CERT) in 1988, which would serve as a crucial resource for incident response and vulnerability management in the years to come. Even though this event was yet to occur, the groundwork for such organizations was being laid through various conferences and publications in the field.

    In the realm of malware, the previous year had seen the emergence of the Brain virus, which was one of the first floppy disk viruses to spread widely. It marked a significant shift in how malicious software could propagate, and the implications of this were just beginning to be understood by the computing community. The Brain virus was a precursor to the more sophisticated attacks that would follow, including the infamous Morris Worm in 1988, which would become a watershed moment in cybersecurity history.

    Additionally, the Chaos Computer Club, founded in Germany in 1984, was becoming increasingly influential. This group not only promoted the hacker ethos but also engaged in discussions around the ethical implications of hacking and security vulnerabilities. Their activities and publications would help to shape the dialogue around computer security and privacy in Europe and beyond.

    Encryption was another hot topic in 1987, as the debate over the appropriate use of cryptographic techniques was intensifying. The concerns surrounding government regulation of encryption technologies were beginning to surface, as law enforcement agencies expressed their apprehension about the potential for criminals to use strong encryption to evade detection. This tension between privacy and security would continue to evolve over the ensuing decades, ultimately leading to significant legislative debates.

    Moreover, phone phreaking — the art of manipulating telephone systems — was still prevalent during this time. While not directly related to computer security, phone phreaking shared similar underlying principles with early hacking practices and highlighted the vulnerabilities inherent in communication systems. This crossover of techniques served as a precursor to later digital security concerns,

    Overall, February 1987 was a month of quiet yet significant developments in the cybersecurity landscape. As the field was maturing, the events of the next few years would set the stage for a new understanding of security in the digital age, leading to the foundational principles that would define cybersecurity as we know it today.

    Sources

    cybersecurity history hacking encryption malware