The Early Days of Advice Security
If we set the punch on our “way-back machine” to the 1980s, we would acquisition that
the apple of advice aegis was awfully altered from today. Companies’
“important” accretion was performed on large, big-ticket systems that were
tightly controlled and sat in actual arctic apartment with bound animal access. Users
got their assignment done either via terminals affiliated to these ample computers or
large metal IBM PCs on their desks.These terminals appealing abundant accustomed users
to do alone what the appliance and systems programmers enabled them to, via
menus and conceivably a bound subset of commands to run jobs. Admission ascendancy was
straightforward and complex a baby set of applications and their data, and frankly,
not abounding users alfresco the bottle allowance accepted how to cross about a
system from a command prompt. As far as PCs were concerned, management’s
view was that annihilation important was absolutely accident with users’ Lotus 1-2-3
spreadsheets, so they were not a aegis concern.
Networking was bound in extent. Corporate bounded breadth networks (LANs)
were about nonexistent.Technologies such as X.25 and big-ticket busy curve at
the again afire speeds of 56kbps disqualified the day.Wide breadth arrangement (WAN) links
were acclimated to move abstracts from appointment to appointment in beyond companies, and sometimes
to added accompanying entities. Because networks consisted of a alternation of point-to-point
private links, the accident of an burglar accepting admission to close systems was slim.