{"id":1336,"date":"2023-02-03T21:23:33","date_gmt":"2023-02-03T21:23:33","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1336"},"modified":"2023-02-03T21:23:33","modified_gmt":"2023-02-03T21:23:33","slug":"%d8%b3%d8%b1%d8%af-%d8%aa%d8%a7%d8%b1%d9%8a%d8%ae%d9%8a-%d9%84%d9%84%d8%a3%d9%85%d9%86-%d8%a7%d9%84%d8%b3%d9%8a%d8%a8%d8%b1%d8%a7%d9%86%d9%8a","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ar\/%d8%a7%d9%84%d8%a3%d9%85%d9%86-%d8%a7%d9%84%d8%b3%d9%8a%d8%a8%d8%b1%d8%a7%d9%86%d9%8a\/%d8%b3%d8%b1%d8%af-%d8%aa%d8%a7%d8%b1%d9%8a%d8%ae%d9%8a-%d9%84%d9%84%d8%a3%d9%85%d9%86-%d8%a7%d9%84%d8%b3%d9%8a%d8%a8%d8%b1%d8%a7%d9%86%d9%8a\/","title":{"rendered":"\u0646\u0628\u0630\u0629 \u062a\u0627\u0631\u064a\u062e\u064a\u0629 \u0639\u0646 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a"},"content":{"rendered":"<p>\u0646\u062d\u0646 \u0646\u0639\u064a\u0634 \u0641\u064a \u0639\u0635\u0631 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a\u060c \u0645\u0645\u0627 \u064a\u0639\u0646\u064a \u062a\u063a\u064a\u064a\u0631\u0627\u062a \u0639\u062f\u064a\u062f\u0629 \u0641\u064a \u062d\u064a\u0627\u0629 \u0627\u0644\u0625\u0646\u0633\u0627\u0646\u060c \u0648\u0642\u0637\u0627\u0639\u0627\u062a\u0647\u0627 \u0627\u0644\u0627\u062c\u062a\u0645\u0627\u0639\u064a\u0629 \u0627\u0644\u0645\u062e\u062a\u0644\u0641\u0629\u060c \u0648\u0627\u0644\u062d\u0643\u0648\u0645\u0627\u062a\u060c \u0648\u0627\u0644\u062f\u0648\u0644. \u0643\u0644 \u0645\u0627 \u0628\u0646\u064a\u0646\u0627\u0647 \u062a\u0623\u062b\u0631 \u0628\u0627\u0644\u0639\u0635\u0631 \u0627\u0644\u0631\u0642\u0645\u064a\u060c \u0648\u0644\u0647\u0630\u0627 \u0627\u0644\u0633\u0628\u0628 \u0646\u0631\u0628\u0637 \u062a\u0643\u0646\u0648\u0644\u0648\u062c\u064a\u0627 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0648\u0627\u0644\u0627\u062a\u0635\u0627\u0644\u0627\u062a \u0628\u0645\u062c\u0645\u0648\u0639\u0629 \u0648\u0627\u0633\u0639\u0629 \u0645\u0646 \u0627\u0644\u0623\u0646\u0634\u0637\u0629 \u0627\u0644\u062a\u064a \u062a\u0633\u0627\u0647\u0645 \u0641\u064a \u0627\u0644\u0625\u062f\u0631\u0627\u0643\u060c \u0648\u0627\u0644\u062a\u0634\u0643\u064a\u0644\u060c \u0648\u0641\u0647\u0645 \u0627\u0644\u062d\u064a\u0627\u0629. <\/p>\n\n\n\n<p>\u0646\u062a\u064a\u062c\u0629 \u0644\u0637\u0628\u064a\u0639\u062a\u0646\u0627 \u0627\u0644\u062a\u0637\u0648\u0631\u064a\u0629\u060c \u0641\u0625\u0646 \u0627\u0644\u062d\u0642 \u0641\u064a \u0627\u0644\u0634\u0639\u0648\u0631 \u0628\u0627\u0644\u0623\u0645\u0627\u0646 \u0641\u064a \u0639\u0635\u0631 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u064a\u062f\u0641\u0639\u0646\u0627 \u0625\u0644\u0649 \u062a\u0637\u0648\u064a\u0631 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0648\u0627\u0644\u062f\u0641\u0627\u0639 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0645\u0646 \u0623\u062c\u0644 \u0636\u0645\u0627\u0646 \u0627\u0644\u062d\u0642 \u0641\u064a \u0627\u0644\u062e\u0635\u0648\u0635\u064a\u0629\u060c \u0648\u0627\u0644\u0633\u0631\u064a\u0629\u060c \u0648\u062d\u0645\u0627\u064a\u0629 \u0627\u0644\u0623\u0635\u0648\u0644 \u0627\u0644\u0645\u0627\u062f\u064a\u0629 \u0648\u063a\u064a\u0631 \u0627\u0644\u0645\u0627\u062f\u064a\u0629. \u0644\u0647\u0630\u0627 \u0627\u0644\u0633\u0628\u0628 \u064a\u0647\u062a\u0645 \u0627\u0644\u0625\u0646\u0633\u0627\u0646 \u0628\u0627\u0644\u062a\u0639\u0644\u0645 \u0623\u0643\u062b\u0631 \u0639\u0646 \u062f\u0631\u0627\u0633\u0627\u062a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u060c \u0648\u0627\u0644\u062a\u062d\u0644\u064a\u0644 \u0627\u0644\u0642\u0627\u0646\u0648\u0646\u064a \u0644\u0642\u0627\u0646\u0648\u0646 \u0627\u0644\u062d\u0627\u0633\u0648\u0628\u060c \u0648\u0627\u0644\u0645\u0646\u0627\u0647\u062c \u0627\u0644\u062c\u0631\u0645\u064a\u0629 \u0641\u064a \u0627\u0644\u0641\u0636\u0627\u0621\u0627\u062a \u0627\u0644\u0627\u0641\u062a\u0631\u0627\u0636\u064a\u0629\u060c \u0644\u0623\u0646 \u0647\u0646\u0627\u0643 \u062d\u0627\u062c\u0629 \u0644\u062a\u0639\u0632\u064a\u0632 \u0623\u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a\u060c \u0633\u0648\u0627\u0621 \u0641\u064a \u0627\u0644\u062f\u0648\u0644\u0629 \u0623\u0648 \u0641\u064a \u0627\u0644\u0642\u0637\u0627\u0639\u0627\u062a \u0627\u0644\u0627\u062c\u062a\u0645\u0627\u0639\u064a\u0629\u060c \u0628\u062d\u064a\u062b \u064a\u064f\u0641\u0647\u0645 \u0623\u0646\u0647 \u062d\u0642 \u0644\u0644\u0645\u0633\u0627\u0647\u0645\u0629 \u0641\u064a \u0627\u0633\u062a\u064a\u0639\u0627\u0628 \u0627\u0644\u0645\u0639\u0631\u0641\u0629 \u0648\u0627\u0644\u0623\u062f\u0648\u0627\u062a \u0627\u0644\u0644\u0627\u0632\u0645\u0629 \u0644\u0636\u0645\u0627\u0646 \u0623\u0645\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0641\u064a \u0627\u0644\u0645\u062c\u0627\u0644\u0627\u062a \u0627\u0644\u0634\u062e\u0635\u064a\u0629 \u0648\u0627\u0644\u062d\u0643\u0648\u0645\u064a\u0629 \u0644\u0644\u0639\u0645\u0644\u060c \u0648\u0643\u0630\u0644\u0643 \u0641\u064a \u0627\u0644\u0642\u0637\u0627\u0639\u0627\u062a \u0627\u0644\u062e\u0627\u0635\u0629 \u0648\u0627\u0644\u0639\u0627\u0645\u0629. \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0648\u0627\u0644\u062a\u062f\u0627\u0628\u064a\u0631 \u0627\u0644\u0648\u0642\u0627\u0626\u064a\u0629.<br><\/p>\n\n\n<h2 class=\"simpletoc-title\">\u0641\u0647\u0631\u0633<\/h2>\n<ul class=\"simpletoc-list\">\n<li><a href=\"#what-is-the-origin-of-the-term-cybernetics\">What is the origin of the term \u201ccybernetics\u201d?<\/a>\n\n<\/li>\n<li><a href=\"#when-did-you-first-mention-cyberspace\">\u0645\u062a\u0649 \u0630\u0643\u0631\u062a \u0627\u0644\u0641\u0636\u0627\u0621 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0644\u0623\u0648\u0644 \u0645\u0631\u0629\u061f<\/a>\n\n<\/li>\n<li><a href=\"#the-beginnings-of-security-in-information-environments\">\u0628\u062f\u0627\u064a\u0627\u062a \u0627\u0644\u0623\u0645\u0646 \u0641\u064a \u0628\u064a\u0626\u0627\u062a \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a<\/a>\n<\/li><\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"what-is-the-origin-of-the-term-cybernetics\">What is the origin of the term \u201ccybernetics\u201d?<\/h2>\n\n\n<p>The term \u201ccybernetics\u201d is as old as the Greek \u201cpolis\u201d or \u201cParthenon,\u201d indicating that \u201cCybernetics comes from the Greek v and means \u201cart of piloting a ship,\u201d though Plato used it in The Republic with the meaning \u201cart of directing men\u201d or \u201cart of governing.\u201d The term went unnoticed for centuries until the first decades of the twentieth century, when writers such as Norbert Wiener were forerunners of studies that explain the relationships and differentiations between living beings and man-made structures. <\/p>\n\n\n\n<p>Wiener suggested that the aim of \u201ccybernetics\u201d was the development of \u201c[\u2026] a language and techniques that allow us actually to attack the problem of control and communication in general, but also to find a good repertoire of ideas and techniques to classify its particular manifestations in certain concepts\u201d. It should be noted that Wiener had his first incursions theoretical ones from the hand of Arturo Rosenblueth Stearns, being one of the structuring of the cybernetic foundations highlighting \u201cthe problem of man-machine interaction\u201d. <\/p>\n\n\n\n<p>Thus, the foundations of what would become \u201ccybernetics\u201d were laid, which investigated control and communication in human, animal, and machine interrelationships.<\/p>\n\n\n\n<p>Ross Ashby was one of the architects of current reflections during the early stages of \u201ccybernetic\u201d thought, which included biological and physical explanations. Ashby visualized in his work \u201cAn Introduction to Cybernetics\u201d, the vastness and connection of the subject, and pointed out that this branch of thought would tend to reveal \u201c[\u2026] a large number of interesting and suggestive parallels between the machine, the brain and society. And it can provide a common language through which discoveries in one field can be easily applied to others.\u201d<\/p>\n\n\n\n<p><br>These three research factors (machine\/brain\/society) interact in a way that acts as a transversal axis, resulting in a new set of processes, relationships, and social languages. The scope of application expanded over time, transforming \u201ccybernetics\u201d into a multidisciplinary field. According to Heylighen and Joslyn (2001), \u201cthe broad cybernetic philosophy that systems are defined by their abstract relationships, functions, and information flows, rather than their concrete material or components, is beginning to permeate popular culture, albeit in a still superficial way [\u2026]\u201d.<\/p>\n\n\n\n<p><br>Somehow, the previous authors\u2019 expression of cultural impregnation was imbued with a \u00abunintelligible\u00bb extension, linked to the idiom typical of the 1980s, in which the extensive use of the prefix \u201cciber\u201d tended to identify very diverse activities or approaches. However, it is important to note that it is linked to the connectivity and radiality of information that is typical of computational media that are assumed to be cells of a virtual system. \u201c[\u2026] cybernetics arises when the effectors (say, a motor, a machine, our muscles, etc.) are connected to a sensory organ, which in turn works with its signals on the effectors,\u201d says Von Foerster (2003). This circular organization is what gives rise to cybernetic systems [\u2026]\u201d.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"when-did-you-first-mention-cyberspace\">\u0645\u062a\u0649 \u0630\u0643\u0631\u062a \u0627\u0644\u0641\u0636\u0627\u0621 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0644\u0623\u0648\u0644 \u0645\u0631\u0629\u061f<\/h2>\n\n\n<p>Those complexities that we previously visualized in the words that precede the prefix \u201ccyber,\u201d are manifested in the use of the term \u201ccyberspace,\u201d which is not initially linked to the control theories or systems that shaped the \u201ccybernetics\u201d disciplinary. Several authors date the term to 1984, citing William Gibson\u2019s fictional work, in which \u201ccyberspace\u201d is described as \u201ca consensual hallucination experienced daily by billions of legitimate operators, in all nations, by children being taught high mathematical concepts\u2026 A graphical representation of information extracted from all of the computers in the human system\u2019s banks. Unfathomable complication.\u201d Despite the novelty of this proposal, what Gibson exposed gives an appetizer of what would certainly be the interconnected digital scenario a few decades later, which is consistent with what was suggested in his work \u201cNeuromancer\u201d.<\/p>\n\n\n\n<p><br>Entering a more theoretical field, Cicognani tries to break into the terminological depths to propose that: \u201c[\u2026] in the term cyber+space, space assumes the meaning of physical matter, while cyber gives it immaterial characteristics\u201d. It has not been easy to reconcile the physical and virtual worlds, and it has necessitated a thorough analytical exercise to broaden and collapse old paradigms that made the material imperative to accept as real.<\/p>\n\n\n\n<p><br>This heated debate over \u201ccyberspace\u201d has resulted in observations such as those of Post (2013), who states that \u201c[\u2026] the question \u2018is cyberspace really a place\u2019?\u201d is akin to asking whether life on land is \u201cidentical to\u201d or \u201cdifferent from\u201d life on the sea. The answer is that it is both at the same time. Even assuming a position of recognition of cyberspace, the various currents of thought fall back into another bifurcation analytical, which consists of abstracting \u201ccyberspace\u201d from the social and focusing on \u201cinstrumentalist\u201d explanations, which, while important, end up being insufficient, finding systematic explanations such as those of Folsom (2007), which details it: \u201c[\u2026] as an embedded switched network for moving data traffic, further characterized by varying degrees of connectivity.\u201d<\/p>\n\n\n\n<p><br>The definitions that tend to address this virtual space, narrowing it with the human, stand out, because conceptualizations, uses, and contributions cannot be separated from its social essence, and \u201ccyberspace\u201d is ultimately an anthropic creation. \u201cWe can characterize cyberspace as the spatial reference used in electronic media, but that raises our need to define space itself, so we can experience how space is actually the product of mental processes,\u201d writes Anders (2001).<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-beginnings-of-security-in-information-environments\">\u0628\u062f\u0627\u064a\u0627\u062a \u0627\u0644\u0623\u0645\u0646 \u0641\u064a \u0628\u064a\u0626\u0627\u062a \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a<\/h2>\n\n\n<p>The absolute dimension that Information and Communication Technologies were deploying on the various sectors that comprise society became overwhelming, and security began to be affected by this phenomenon as a result of the number of new dynamics that emerged as a result of it. According to Caro, \u201cjust as the so-called world web or World Wide Web has evolved, so have the threats it faces.\u201d Strategic analyses, in this sense, must always run concurrently with threat reconfigurations or emergence in order to delineate their projection towards security and defense. <\/p>\n\n\n\n<p>When Fred Cohen ventured to state a previously unknown feature of computing, such as viruses, the concepts rooted in 1984 did not initially notice the strategic impact, specifying the researcher: \u201cWe define computer \u201cvirus\u201d as a program that can \u2018infect\u2019 other programs by modifying them to include a possibly evolved copy of itself.\u201d These appreciations of Cohen at the time seemed to be limited to a technical characterization of civilian computing matters, but theoretical assimilation was what led to the start of talk of \u201ccyber threats\u201d in different countries and this gave rise to \u201ccyber defense\u201d and how consequence to \u201cCybersecurity\u201d.<\/p>\n\n\n\n<p><br>It would be necessary to add to the exposed technical variable, the global trend, where the population and its institutions began to interact closely with cybernetic systems, to the point that Castells described this relationship as: \u201cthe extension and growth of the body and mind of subjects humans in interaction networks powered by software-operated microelectronic communication technologies\u201d. This panorama showed a technological exposure, together with the potential of a threat that led to the establishment of new nuances in Information Security, constituting more specific sub-areas such as the so-called \u201cCybersecurity\u201d or \u201cComputer Forensics\u201d.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u0646\u062d\u0646 \u0646\u0639\u064a\u0634 \u0641\u064a \u0639\u0635\u0631 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a\u060c \u0627\u0644\u0630\u064a \u064a\u0639\u0646\u064a \u062a\u063a\u064a\u064a\u0631\u0627\u062a \u0639\u062f\u064a\u062f\u0629 \u0641\u064a \u062d\u064a\u0627\u0629 \u0627\u0644\u0625\u0646\u0633\u0627\u0646\u060c \u0648\u0642\u0637\u0627\u0639\u0627\u062a\u0647 \u0627\u0644\u0627\u062c\u062a\u0645\u0627\u0639\u064a\u0629 \u0627\u0644\u0645\u062e\u062a\u0644\u0641\u0629\u060c \u0648\u062d\u0643\u0648\u0645\u0627\u062a\u0647\u060c \u0648\u062f\u0648\u0644\u0647. \u0641\u0643\u0644 \u0645\u0627 \u0628\u0646\u064a\u0646\u0627\u0647 \u0643\u0627\u0646 \u0645\u062a\u0623\u062b\u0631\u0627\u064b \u0628\u0627\u0644\u0639\u0635\u0631 \u0627\u0644\u0631\u0642\u0645\u064a. <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ar\/%d8%a7%d9%84%d8%a3%d9%85%d9%86-%d8%a7%d9%84%d8%b3%d9%8a%d8%a8%d8%b1%d8%a7%d9%86%d9%8a\/%d8%b3%d8%b1%d8%af-%d8%aa%d8%a7%d8%b1%d9%8a%d8%ae%d9%8a-%d9%84%d9%84%d8%a3%d9%85%d9%86-%d8%a7%d9%84%d8%b3%d9%8a%d8%a8%d8%b1%d8%a7%d9%86%d9%8a\/\">\u0645\u062a\u0627\u0628\u0639\u0629 \u0627\u0644\u0642\u0631\u0627\u0621\u0629 <span class=\"screen-reader-text\">\u0646\u0628\u0630\u0629 \u062a\u0627\u0631\u064a\u062e\u064a\u0629 \u0639\u0646 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1340,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Historical Account of Cybersecurity | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ar\/\u0627\u0644\u0623\u0645\u0646-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\/\u0633\u0631\u062f-\u062a\u0627\u0631\u064a\u062e\u064a-\u0644\u0644\u0623\u0645\u0646-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Historical Account of Cybersecurity | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ar\/\u0627\u0644\u0623\u0645\u0646-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\/\u0633\u0631\u062f-\u062a\u0627\u0631\u064a\u062e\u064a-\u0644\u0644\u0623\u0645\u0646-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-03T21:23:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 \u062f\u0642\u0627\u0626\u0642\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Historical account of Cybersecurity\",\"datePublished\":\"2023-02-03T21:23:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"},\"wordCount\":1347,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"ar\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\",\"name\":\"Historical Account of Cybersecurity | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"datePublished\":\"2023-02-03T21:23:33+00:00\",\"description\":\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Historical account of Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Historical account of Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ar\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u0627\u0644\u062d\u0633\u0627\u0628 \u0627\u0644\u062a\u0627\u0631\u064a\u062e\u064a \u0644\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a | \u0627\u0644\u0625\u062d\u0627\u0637\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629","description":"\u0627\u0643\u062a\u0634\u0641 \u062a\u0637\u0648\u0631 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u060c \u0645\u0646 \u0628\u062f\u0627\u064a\u0627\u062a\u0647 \u0625\u0644\u0649 \u0627\u0644\u062d\u0627\u0644\u0629 \u0627\u0644\u062d\u0627\u0644\u064a\u0629 \u0644\u0644\u0635\u0646\u0627\u0639\u0629. \u062a\u0639\u0631\u0641 \u0639\u0644\u0649 \u0627\u0644\u062a\u062d\u062f\u064a\u0627\u062a \u0641\u064a \u062a\u0627\u0631\u064a\u062e \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ar\/\u0627\u0644\u0623\u0645\u0646-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\/\u0633\u0631\u062f-\u062a\u0627\u0631\u064a\u062e\u064a-\u0644\u0644\u0623\u0645\u0646-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\/","og_locale":"ar_AR","og_type":"article","og_title":"Historical Account of Cybersecurity | Security Briefing","og_description":"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.","og_url":"https:\/\/securitybriefing.net\/ar\/\u0627\u0644\u0623\u0645\u0646-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\/\u0633\u0631\u062f-\u062a\u0627\u0631\u064a\u062e\u064a-\u0644\u0644\u0623\u0645\u0646-\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\/","og_site_name":"Security Briefing","article_published_time":"2023-02-03T21:23:33+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"security","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"7 \u062f\u0642\u0627\u0626\u0642"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Historical account of Cybersecurity","datePublished":"2023-02-03T21:23:33+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"},"wordCount":1347,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","articleSection":["cybersecurity"],"inLanguage":"ar"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/","name":"\u0627\u0644\u062d\u0633\u0627\u0628 \u0627\u0644\u062a\u0627\u0631\u064a\u062e\u064a \u0644\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a | \u0627\u0644\u0625\u062d\u0627\u0637\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","datePublished":"2023-02-03T21:23:33+00:00","description":"\u0627\u0643\u062a\u0634\u0641 \u062a\u0637\u0648\u0631 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a\u060c \u0645\u0646 \u0628\u062f\u0627\u064a\u0627\u062a\u0647 \u0625\u0644\u0649 \u0627\u0644\u062d\u0627\u0644\u0629 \u0627\u0644\u062d\u0627\u0644\u064a\u0629 \u0644\u0644\u0635\u0646\u0627\u0639\u0629. \u062a\u0639\u0631\u0641 \u0639\u0644\u0649 \u0627\u0644\u062a\u062d\u062f\u064a\u0627\u062a \u0641\u064a \u062a\u0627\u0631\u064a\u062e \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","width":662,"height":327,"caption":"Historical account of Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Historical account of Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\u0627\u0644\u0625\u062d\u0627\u0637\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\u0627\u0644\u0625\u062d\u0627\u0637\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"\u062d\u0645\u0627\u064a\u0629","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"\u0623\u062f\u0645\u0646 \u0643\u0627\u062a\u0628\u0629 \u0643\u0628\u064a\u0631\u0629 \u0641\u064a \u0642\u0633\u0645 \u062a\u0643\u0646\u0648\u0644\u0648\u062c\u064a\u0627 \u0627\u0644\u062d\u0643\u0648\u0645\u0629. \u0643\u062a\u0628\u062a \u0633\u0627\u0628\u0642\u064b\u0627 \u0641\u064a PYMNTS \u0648The Bay State Banner\u060c \u0648\u062d\u0635\u0644\u062a \u0639\u0644\u0649 \u062f\u0631\u062c\u0629 \u0627\u0644\u0628\u0643\u0627\u0644\u0648\u0631\u064a\u0648\u0633 \u0641\u064a \u0627\u0644\u0643\u062a\u0627\u0628\u0629 \u0627\u0644\u0625\u0628\u062f\u0627\u0639\u064a\u0629 \u0645\u0646 \u062c\u0627\u0645\u0639\u0629 \u0643\u0627\u0631\u0646\u064a\u062c\u064a \u0645\u064a\u0644\u0648\u0646. \u0648\u0647\u064a \u062a\u0642\u064a\u0645 \u062e\u0627\u0631\u062c \u0628\u0648\u0633\u0637\u0646.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ar\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/posts\/1336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/comments?post=1336"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/posts\/1336\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/media\/1340"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/media?parent=1336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/categories?post=1336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ar\/wp-json\/wp\/v2\/tags?post=1336"}],"curies":[{"name":"\u0648\u0648\u0631\u062f\u0628\u0631\u064a\u0633","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}