{"id":1336,"date":"2023-02-03T21:23:33","date_gmt":"2023-02-03T21:23:33","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1336"},"modified":"2023-02-03T21:23:33","modified_gmt":"2023-02-03T21:23:33","slug":"historisk-beretning-om-cybersikkerhed","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/da\/cybersikkerhed\/historisk-beretning-om-cybersikkerhed\/","title":{"rendered":"Historisk redeg\u00f8relse for cybersikkerhed"},"content":{"rendered":"<p>Vi lever i informationsalderen, hvilket indeb\u00e6rer talrige \u00e6ndringer i menneskelivet, dets forskellige sociale sektorer, regeringer og stater. Alt, hvad vi har bygget, er blevet p\u00e5virket af den digitale tidsalder, hvilket er grunden til, at vi forbinder Informations- og Kommunikationsteknologier med en overflod af aktiviteter, der bidrager til opfattelsen, strukturen og forst\u00e5elsen af livet. <\/p>\n\n\n\n<p>Som et resultat af vores evolution\u00e6re natur driver retten til at f\u00f8le sig sikker i informationsalderen os til at udvikle cybersikkerhed og cyberforsvar for at garantere retten til privatliv, anonymitet og beskyttelse af materielle og immaterielle aktiver. Derfor er mennesket interesseret i at l\u00e6re mere om cybersikkerhedsstudier, juridisk analyse af computerret og kriminologiske tilgange i virtuelle rum, fordi der er behov for at fremme informationssikkerhed, b\u00e5de i staten og i de sociale sektorer, s\u00e5 det forst\u00e5s, at det er en ret at bidrage til tilegnelsen af viden og de n\u00f8dvendige v\u00e6rkt\u00f8jer til at sikre informationssikkerheden i personlige og statslige handlingsrum samt i de private og offentlige sektorer. information og forebyggende foranstaltninger.<br><\/p>\n\n\n<h2 class=\"simpletoc-title\">Indholdsfortegnelse<\/h2>\n<ul class=\"simpletoc-list\">\n<li><a href=\"#what-is-the-origin-of-the-term-cybernetics\">Hvad er oprindelsen af udtrykket \u201ckybernetik\u201d?<\/a>\n\n<\/li>\n<li><a href=\"#when-did-you-first-mention-cyberspace\">Hvorn\u00e5r n\u00e6vnte du f\u00f8rst cyberspace?<\/a>\n\n<\/li>\n<li><a href=\"#the-beginnings-of-security-in-information-environments\">Begyndelsen p\u00e5 sikkerhed i informationsmilj\u00f8er<\/a>\n<\/li><\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"what-is-the-origin-of-the-term-cybernetics\">Hvad er oprindelsen af udtrykket \u201ckybernetik\u201d?<\/h2>\n\n\n<p>Udtrykket \u201ckybernetik\u201d er lige s\u00e5 gammelt som den gr\u00e6ske \u201cpolis\u201d eller \u201cParthenon,\u201d hvilket indikerer, at \u201cKybernetik kommer fra gr\u00e6sk v og betyder \u201ckunsten at navigere et skib,\u201d selvom Platon brugte det i Staten med betydningen \u201ckunsten at lede mennesker\u201d eller \u201ckunsten at styre.\u201d Udtrykket gik ubem\u00e6rket hen i \u00e5rhundreder indtil de f\u00f8rste \u00e5rtier af det tyvende \u00e5rhundrede, da forfattere som Norbert Wiener var forl\u00f8bere for studier, der forklarer forholdene og forskellene mellem levende v\u00e6sener og menneskeskabte strukturer. <\/p>\n\n\n\n<p>Wiener foreslog, at m\u00e5let med \u201ckybernetik\u201d var udviklingen af \u201c[\u2026] et sprog og teknikker, der tillader os faktisk at angribe problemet med kontrol og kommunikation generelt, men ogs\u00e5 at finde et godt repertoire af ideer og teknikker til at klassificere dets s\u00e6rlige manifestationer i visse begreber\u201d. Det skal bem\u00e6rkes, at Wiener havde sine f\u00f8rste teoretiske indtr\u00e6ngen fra Arturo Rosenblueth Stearns, som var en af strukturerne af de kybernetiske fundamenter, der fremh\u00e6vede \u201cproblemet med menneske-maskine interaktion\u201d. <\/p>\n\n\n\n<p>S\u00e5ledes blev fundamentet lagt for det, der ville blive \u201ckybernetik\u201d, som unders\u00f8gte kontrol og kommunikation i menneskelige, dyre- og maskineinteraktioner.<\/p>\n\n\n\n<p>Ross Ashby var en af arkitekterne bag de nuv\u00e6rende refleksioner i de tidlige stadier af \u201ckybernetisk\u201d tanke, som omfattede biologiske og fysiske forklaringer. Ashby visualiserede i sit arbejde \u201cAn Introduction to Cybernetics\u201d, emnets vidde og forbindelse, og p\u00e5pegede, at denne tankegang ville tendere til at afsl\u00f8re \u201c[\u2026] et stort antal interessante og suggestive paralleller mellem maskinen, hjernen og samfundet. Og det kan give et f\u00e6lles sprog, gennem hvilket opdagelser i et felt let kan anvendes p\u00e5 andre.\u201d<\/p>\n\n\n\n<p><br>Disse tre forskningsfaktorer (maskine\/hjerne\/samfund) interagerer p\u00e5 en m\u00e5de, der fungerer som en tv\u00e6rg\u00e5ende akse, hvilket resulterer i et nyt s\u00e6t af processer, relationer og sociale sprog. Anvendelsesomr\u00e5det udvidede sig over tid og transformerede \u201ckybernetik\u201d til et tv\u00e6rfagligt felt. If\u00f8lge Heylighen og Joslyn (2001), \u201cden brede kybernetiske filosofi, at systemer er defineret af deres abstrakte relationer, funktioner og informationsstr\u00f8mme, snarere end deres konkrete materiale eller komponenter, begynder at gennemtr\u00e6nge popul\u00e6rkulturen, omend p\u00e5 en stadig overfladisk m\u00e5de [\u2026]\u201d.<\/p>\n\n\n\n<p><br>P\u00e5 en eller anden m\u00e5de var de tidligere forfatteres udtryk for kulturel impr\u00e6gnering gennemsyret af en \u2019uintelligibel\u00ab udvidelse, forbundet med det idiom, der var typisk for 1980\u00bberne, hvor den omfattende brug af pr\u00e6fikset \u201cciber\u201d tendede til at identificere meget forskellige aktiviteter eller tilgange. Det er dog vigtigt at bem\u00e6rke, at det er forbundet med informationsforbindelsen og radialiteten, der er typisk for computerbaserede medier, der antages at v\u00e6re celler i et virtuelt system. \u201c[\u2026] kybernetik opst\u00e5r, n\u00e5r effektorerne (siger, en motor, en maskine, vores muskler osv.) er forbundet til et sanseorgan, der igen arbejder med sine signaler p\u00e5 effektorerne,\u201d siger Von Foerster (2003). Denne cirkul\u00e6re organisation er det, der giver anledning til kybernetiske systemer [\u2026]\u201d.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"when-did-you-first-mention-cyberspace\">Hvorn\u00e5r n\u00e6vnte du f\u00f8rst cyberspace?<\/h2>\n\n\n<p>De kompleksiteter, som vi tidligere visualiserede i ordene, der g\u00e5r forud for pr\u00e6fikset \u201ccyber,\u201d manifesteres i brugen af udtrykket \u201ccyberspace,\u201d som ikke oprindeligt er forbundet med kontrolteorierne eller systemerne, der formede den \u201ckybernetiske\u201d disciplin. Flere forfattere daterer udtrykket til 1984 og citerer William Gibsons fiktive v\u00e6rk, hvor \u201ccyberspace\u201d beskrives som \u201cen konsensuel hallucination oplevet dagligt af milliarder af legitime operat\u00f8rer, i alle nationer, af b\u00f8rn, der undervises i h\u00f8je matematiske begreber\u2026 En grafisk repr\u00e6sentation af information udtrukket fra alle computerne i det menneskelige systems banker. Ubegribelig kompleksitet.\u201d P\u00e5 trods af nyheden i dette forslag giver det, som Gibson udsatte, en forsmag p\u00e5, hvad der bestemt ville v\u00e6re det sammenkoblede digitale scenarie nogle \u00e5rtier senere, hvilket er i overensstemmelse med det, der blev foresl\u00e5et i hans v\u00e6rk \u201cNeuromancer\u201d.<\/p>\n\n\n\n<p><br>N\u00e5r man g\u00e5r ind i et mere teoretisk felt, fors\u00f8ger Cicognani at bryde ind i de terminologiske dybder for at foresl\u00e5, at: \u201c[\u2026] i udtrykket cyber+space, antager rum betydningen af fysisk materie, mens cyber giver det immaterielle egenskaber\u201d. Det har ikke v\u00e6ret let at forene de fysiske og virtuelle verdener, og det har kr\u00e6vet en grundig analytisk \u00f8velse for at udvide og nedbryde gamle paradigmer, der gjorde det materielle imperativt at acceptere som virkeligt.<\/p>\n\n\n\n<p><br>Denne ophedede debat om \u201ccyberspace\u201d har resulteret i observationer som dem fra Post (2013), der udtaler, at \u201c[\u2026] sp\u00f8rgsm\u00e5let \u2018er cyberspace virkelig et sted\u2019?\u201d svarer til at sp\u00f8rge, om livet p\u00e5 land er \u201cidentisk med\u201d eller \u201cforskelligt fra\u201d livet p\u00e5 havet. Svaret er, at det er begge dele p\u00e5 samme tid. Selv n\u00e5r man antager en position af anerkendelse af cyberspace, falder de forskellige tankestr\u00f8mme tilbage i en anden bifurkation analytisk, som best\u00e5r i at abstrahere \u201ccyberspace\u201d fra det sociale og fokusere p\u00e5 \u201cinstrumentalistiske\u201d forklaringer, som, selvom de er vigtige, ender med at v\u00e6re utilstr\u00e6kkelige, og finde systematiske forklaringer som dem fra Folsom (2007), der detaljerer det: \u201c[\u2026] som et indlejret skiftet netv\u00e6rk til at flytte datatrafik, yderligere karakteriseret ved varierende grader af konnektivitet.\u201d<\/p>\n\n\n\n<p><br>De definitioner, der har tendens til at adressere dette virtuelle rum, indsn\u00e6vrer det med det menneskelige, skiller sig ud, fordi konceptualiseringer, anvendelser og bidrag ikke kan adskilles fra dets sociale essens, og \u201ccyberspace\u201d er i sidste ende en antropisk skabelse. \u201cVi kan karakterisere cyberspace som den rumlige reference, der bruges i elektroniske medier, men det rejser vores behov for at definere rummet selv, s\u00e5 vi kan opleve, hvordan rummet faktisk er produktet af mentale processer,\u201d skriver Anders (2001).<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-beginnings-of-security-in-information-environments\">Begyndelsen p\u00e5 sikkerhed i informationsmilj\u00f8er<\/h2>\n\n\n<p>Den absolutte dimension, som Informations- og Kommunikationsteknologier udrullede p\u00e5 de forskellige sektorer, der udg\u00f8r samfundet, blev overv\u00e6ldende, og sikkerheden begyndte at blive p\u00e5virket af dette f\u00e6nomen som et resultat af antallet af nye dynamikker, der opstod som et resultat af det. If\u00f8lge Caro, \u201cligesom det s\u00e5kaldte verdensomsp\u00e6ndende web eller World Wide Web har udviklet sig, s\u00e5 har de trusler, det st\u00e5r overfor.\u201d Strategiske analyser i denne forstand skal altid k\u00f8re parallelt med trusselsrekonfigurationer eller fremkomst for at afgr\u00e6nse deres projektion mod sikkerhed og forsvar. <\/p>\n\n\n\n<p>Da Fred Cohen vovede at angive en tidligere ukendt funktion af databehandling, s\u00e5som vira, bem\u00e6rkede de koncepter, der var rodf\u00e6stet i 1984, ikke oprindeligt den strategiske indvirkning, og specificerede forskeren: \u201cVi definerer computer \u201cvirus\u201d som et program, der kan \u2018inficere\u2019 andre programmer ved at \u00e6ndre dem for at inkludere en muligvis udviklet kopi af sig selv.\u201d Disse vurderinger af Cohen p\u00e5 det tidspunkt syntes at v\u00e6re begr\u00e6nset til en teknisk karakterisering af civile databehandlingssp\u00f8rgsm\u00e5l, men teoretisk assimilation var det, der f\u00f8rte til starten af at tale om \u201ccybertrusler\u201d i forskellige lande, og dette gav anledning til \u201ccyberforsvar\u201d og som konsekvens til \u201cCybersikkerhed\u201d.<\/p>\n\n\n\n<p><br>Det ville v\u00e6re n\u00f8dvendigt at tilf\u00f8je til den udsatte tekniske variabel, den globale tendens, hvor befolkningen og dens institutioner begyndte at interagere t\u00e6t med kybernetiske systemer, til det punkt, at Castells beskrev dette forhold som: \u201cudvidelsen og v\u00e6ksten af kroppen og sindet af menneskelige subjekter i interaktionsnetv\u00e6rk drevet af software-opererede mikroelektroniske kommunikationsteknologier\u201d. Dette panorama viste en teknologisk eksponering sammen med potentialet for en trussel, der f\u00f8rte til etableringen af nye nuancer i Informationssikkerhed, der udgjorde mere specifikke underomr\u00e5der som den s\u00e5kaldte \u201cCybersikkerhed\u201d eller \u201cComputer Forensics\u201d.<\/p>","protected":false},"excerpt":{"rendered":"<p>Vi lever i informationsalderen, som indeb\u00e6rer talrige \u00e6ndringer i menneskelivet, dets forskellige sociale sektorer, regeringer og stater. Alt, hvad vi har bygget, er blevet p\u00e5virket af den digitale... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/da\/cybersikkerhed\/historisk-beretning-om-cybersikkerhed\/\">Read more <span class=\"screen-reader-text\">Historisk redeg\u00f8relse for cybersikkerhed<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1340,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Historical Account of Cybersecurity | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/da\/cybersikkerhed\/historisk-beretning-om-cybersikkerhed\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Historical Account of Cybersecurity | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/da\/cybersikkerhed\/historisk-beretning-om-cybersikkerhed\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-03T21:23:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Historical account of Cybersecurity\",\"datePublished\":\"2023-02-03T21:23:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"},\"wordCount\":1347,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\",\"name\":\"Historical Account of Cybersecurity | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"datePublished\":\"2023-02-03T21:23:33+00:00\",\"description\":\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Historical account of Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Historical account of Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/da\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Historisk beretning om cybersikkerhed | Sikkerhedsbriefing","description":"Opdag udviklingen af cybersikkerhed, fra dens begyndelse til den nuv\u00e6rende tilstand af industrien. L\u00e6r om udfordringerne i cybersikkerhedens historie.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/da\/cybersikkerhed\/historisk-beretning-om-cybersikkerhed\/","og_locale":"da_DK","og_type":"article","og_title":"Historical Account of Cybersecurity | Security Briefing","og_description":"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.","og_url":"https:\/\/securitybriefing.net\/da\/cybersikkerhed\/historisk-beretning-om-cybersikkerhed\/","og_site_name":"Security Briefing","article_published_time":"2023-02-03T21:23:33+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"security","Estimeret l\u00e6setid":"7 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Historical account of Cybersecurity","datePublished":"2023-02-03T21:23:33+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"},"wordCount":1347,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","articleSection":["cybersecurity"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/","name":"Historisk beretning om cybersikkerhed | Sikkerhedsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","datePublished":"2023-02-03T21:23:33+00:00","description":"Opdag udviklingen af cybersikkerhed, fra dens begyndelse til den nuv\u00e6rende tilstand af industrien. L\u00e6r om udfordringerne i cybersikkerhedens historie.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","width":662,"height":327,"caption":"Historical account of Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Historical account of Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sikkerhedsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sikkerhedsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"sikkerhed","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin er seniorskribent for Government Technology. Hun har tidligere skrevet for PYMNTS og The Bay State Banner og har en BA i kreativ skrivning fra Carnegie Mellon. Hun bor uden for Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/da\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/1336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/comments?post=1336"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/1336\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media\/1340"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media?parent=1336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/categories?post=1336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/tags?post=1336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}