C-Suite On Deck
Keep me plugged in with the best
Join thousands of your peers and receive our weekly newsletter with the latest news, industry events, customer insights, and market intelligence.
I agree to the
terms of service
PLEASE CORRECT THE FOLLOWING:
Please Enter Some Keywords
Some aspects of info security haven't changed much in theory
You may be interested to know that most every modern cybersecurity technique used today is based on methodologies developed and used thousands of years ago. So, in the spirit of those who don’t know their past are doomed to repeat it, let’s look at how modern cybersecurity has evolved from a stick and parchment paper. Information Security Before Computers. For millennia the basic concepts of cyber security have been deployed to protect information assets and almost always for military applications. Going back to antiquity and leading up to the dawn of computing the following techniques were used: The Spartan Scytale: around 600 BC Spartans used a process that consists of a leather strap wrapped around a wooden rod. The letters on the leather strip are meaningless when it's unwrapped, and only if the recipient has the correctly sized rod does the message make sense. The Caesar Cipher: Julius Caesar is credited with a type of substitution cipher in which each letter in the plaintext is 'shifted' a certain number of places down the alphabet. For example, with a shift of 1, A would be replaced by B, B would become C, and so on.
I'm for real
Enter your email once to access all our information and resources.
(Your email address is required so we know you're a real person)
By downloading this content, you give permission for your contact information to be shared with the content provider who may contact you in regards to the content.