{"id":1336,"date":"2023-02-03T21:23:33","date_gmt":"2023-02-03T21:23:33","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1336"},"modified":"2023-02-03T21:23:33","modified_gmt":"2023-02-03T21:23:33","slug":"a-kiberbiztonsag-torteneti-attekintese","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-torteneti-attekintese\/","title":{"rendered":"A kiberbiztons\u00e1g t\u00f6rt\u00e9neti \u00e1ttekint\u00e9se"},"content":{"rendered":"<p>Az inform\u00e1ci\u00f3s korban \u00e9l\u00fcnk, ami sz\u00e1mos v\u00e1ltoz\u00e1st jelent az emberi \u00e9letben, annak k\u00fcl\u00f6nb\u00f6z\u0151 t\u00e1rsadalmi szektoraiban, korm\u00e1nyokban \u00e9s \u00e1llamokban. Minden, amit fel\u00e9p\u00edtett\u00fcnk, a digit\u00e1lis kor hat\u00e1sa alatt \u00e1ll, ez\u00e9rt t\u00e1rs\u00edtjuk az inform\u00e1ci\u00f3s \u00e9s kommunik\u00e1ci\u00f3s technol\u00f3gi\u00e1kat sz\u00e1mos olyan tev\u00e9kenys\u00e9ggel, amelyek hozz\u00e1j\u00e1rulnak az \u00e9let \u00e9rz\u00e9kel\u00e9s\u00e9hez, strukt\u00far\u00e1j\u00e1hoz \u00e9s meg\u00e9rt\u00e9s\u00e9hez. <\/p>\n\n\n\n<p>Evol\u00faci\u00f3s term\u00e9szet\u00fcnk eredm\u00e9nyek\u00e9nt az inform\u00e1ci\u00f3s korban val\u00f3 biztons\u00e1g\u00e9rzethez val\u00f3 jog arra \u00f6szt\u00f6n\u00f6z benn\u00fcnket, hogy fejlessz\u00fck a kiberbiztons\u00e1got \u00e9s a kiberv\u00e9delmet annak \u00e9rdek\u00e9ben, hogy garant\u00e1ljuk a mag\u00e1n\u00e9lethez, az anonimit\u00e1shoz \u00e9s a k\u00e9zzelfoghat\u00f3 \u00e9s immateri\u00e1lis javak v\u00e9delm\u00e9hez val\u00f3 jogot. Ez\u00e9rt \u00e9rdekli az embert, hogy t\u00f6bbet tudjon meg a kiberbiztons\u00e1gi tanulm\u00e1nyokr\u00f3l, a sz\u00e1m\u00edt\u00f3g\u00e9pes jogi elemz\u00e9sekr\u0151l \u00e9s a virtu\u00e1lis terek kriminol\u00f3giai megk\u00f6zel\u00edt\u00e9seir\u0151l, mert sz\u00fcks\u00e9g van az inform\u00e1ci\u00f3biztons\u00e1g el\u0151mozd\u00edt\u00e1s\u00e1ra mind az \u00e1llam, mind a t\u00e1rsadalmi szektorok ter\u00fclet\u00e9n, hogy meg\u00e9rts\u00e9k, hogy ez egy jog, amely hozz\u00e1j\u00e1rul a tud\u00e1s \u00e9s a sz\u00fcks\u00e9ges eszk\u00f6z\u00f6k megszerz\u00e9s\u00e9hez az inform\u00e1ci\u00f3 biztons\u00e1g\u00e1nak biztos\u00edt\u00e1sa \u00e9rdek\u00e9ben a szem\u00e9lyes \u00e9s korm\u00e1nyzati tev\u00e9kenys\u00e9gi terekben, valamint a mag\u00e1n- \u00e9s k\u00f6zszektorban. inform\u00e1ci\u00f3 \u00e9s megel\u0151z\u0151 int\u00e9zked\u00e9sek.<br><\/p>\n\n\n<h2 class=\"simpletoc-title\">Tartalomjegyz\u00e9k<\/h2>\n<ul class=\"simpletoc-list\">\n<li><a href=\"#what-is-the-origin-of-the-term-cybernetics\">Mi a \u201ckibernetika\u201d kifejez\u00e9s eredete?<\/a>\n\n<\/li>\n<li><a href=\"#when-did-you-first-mention-cyberspace\">Mikor eml\u00edtetted el\u0151sz\u00f6r a kibert\u00e9r fogalm\u00e1t?<\/a>\n\n<\/li>\n<li><a href=\"#the-beginnings-of-security-in-information-environments\">A biztons\u00e1g kezdetei az inform\u00e1ci\u00f3s k\u00f6rnyezetekben<\/a>\n<\/li><\/ul>\n\n<h2 class=\"wp-block-heading\" id=\"what-is-the-origin-of-the-term-cybernetics\">Mi a \u201ckibernetika\u201d kifejez\u00e9s eredete?<\/h2>\n\n\n<p>A \u201ckibernetika\u201d kifejez\u00e9s olyan r\u00e9gi, mint a g\u00f6r\u00f6g \u201cpolis\u201d vagy \u201cParthenon\u201d, jelezve, hogy a \u201ckibernetika\u201c a g\u00f6r\u00f6g v-b\u0151l sz\u00e1rmazik, \u00e9s \u201dhaj\u00f3vezet\u00e9s m\u0171v\u00e9szet\u00e9t\u201c jelenti, b\u00e1r Plat\u00f3n a K\u00f6zt\u00e1rsas\u00e1gban az \u201demberek ir\u00e1ny\u00edt\u00e1s\u00e1nak m\u0171v\u00e9szete\u201c vagy \u201dkorm\u00e1nyz\u00e1s m\u0171v\u00e9szete\" \u00e9rtelemben haszn\u00e1lta. A kifejez\u00e9s \u00e9vsz\u00e1zadokig \u00e9szrev\u00e9tlen maradt, m\u00edg a huszadik sz\u00e1zad els\u0151 \u00e9vtizedeiben olyan \u00edr\u00f3k, mint Norbert Wiener, az \u00e9l\u0151l\u00e9nyek \u00e9s az ember alkotta strukt\u00far\u00e1k k\u00f6z\u00f6tti kapcsolatok \u00e9s k\u00fcl\u00f6nbs\u00e9gek magyar\u00e1zat\u00e1t c\u00e9lz\u00f3 tanulm\u00e1nyok el\u0151fut\u00e1rai voltak. <\/p>\n\n\n\n<p>Wiener azt javasolta, hogy a \u201ckibernetika\u201d c\u00e9lja \u201cegy nyelv \u00e9s technik\u00e1k kifejleszt\u00e9se, amelyek lehet\u0151v\u00e9 teszik sz\u00e1munkra, hogy t\u00e9nylegesen megt\u00e1madjuk az ir\u00e1ny\u00edt\u00e1s \u00e9s kommunik\u00e1ci\u00f3 probl\u00e9m\u00e1j\u00e1t \u00e1ltal\u00e1ban, de egy j\u00f3 \u00f6tlet- \u00e9s technikareperto\u00e1r megtal\u00e1l\u00e1sa is, hogy oszt\u00e1lyozzuk annak saj\u00e1tos megnyilv\u00e1nul\u00e1sait bizonyos fogalmakban\u201d. Meg kell jegyezni, hogy Wiener els\u0151 elm\u00e9leti behatol\u00e1sait Arturo Rosenblueth Stearns kez\u00e9b\u0151l szerezte, aki a kibernetikai alapok strukt\u00far\u00e1j\u00e1nak egyik kiemelked\u0151 alakja volt, kiemelve \u201caz ember-g\u00e9p interakci\u00f3 probl\u00e9m\u00e1j\u00e1t\u201d. <\/p>\n\n\n\n<p>\u00cdgy lerakt\u00e1k a \u201ckibernetika\u201d alapjait, amely az emberi, \u00e1llati \u00e9s g\u00e9pi kapcsolatok ir\u00e1ny\u00edt\u00e1s\u00e1t \u00e9s kommunik\u00e1ci\u00f3j\u00e1t vizsg\u00e1lta.<\/p>\n\n\n\n<p>Ross Ashby a \u201ckibernetikai\u201d gondolkod\u00e1s korai szakasz\u00e1ban a jelenlegi reflexi\u00f3k egyik \u00e9p\u00edt\u00e9sze volt, amely biol\u00f3giai \u00e9s fizikai magyar\u00e1zatokat is tartalmazott. Ashby \u201cAn Introduction to Cybernetics\u201d c\u00edm\u0171 munk\u00e1j\u00e1ban vizualiz\u00e1lta a t\u00e9ma hatalmass\u00e1g\u00e1t \u00e9s \u00f6sszekapcsolts\u00e1g\u00e1t, \u00e9s r\u00e1mutatott, hogy ez a gondolkod\u00e1si \u00e1g \u201csz\u00e1mos \u00e9rdekes \u00e9s javaslattev\u0151 p\u00e1rhuzamot t\u00e1rhat fel a g\u00e9p, az agy \u00e9s a t\u00e1rsadalom k\u00f6z\u00f6tt. \u00c9s k\u00f6z\u00f6s nyelvet biztos\u00edthat, amelyen kereszt\u00fcl az egyik ter\u00fcleten tett felfedez\u00e9sek k\u00f6nnyen alkalmazhat\u00f3k m\u00e1sokra.\u201d<\/p>\n\n\n\n<p><br>Ez a h\u00e1rom kutat\u00e1si t\u00e9nyez\u0151 (g\u00e9p\/agyi\/t\u00e1rsadalom) \u00fagy hat, mint egy transzverz\u00e1lis tengely, amely \u00faj folyamatok, kapcsolatok \u00e9s t\u00e1rsadalmi nyelvek sorozat\u00e1t eredm\u00e9nyezi. Az alkalmaz\u00e1si ter\u00fclet id\u0151vel kib\u0151v\u00fclt, a \u201ckibernetika\u201d multidiszciplin\u00e1ris ter\u00fclett\u00e9 v\u00e1lt. Heylighen \u00e9s Joslyn (2001) szerint \u201ca sz\u00e9les kibernetikai filoz\u00f3fia, amely szerint a rendszereket absztrakt kapcsolataik, funkci\u00f3ik \u00e9s inform\u00e1ci\u00f3\u00e1raml\u00e1saik hat\u00e1rozz\u00e1k meg, nem pedig konkr\u00e9t anyagi vagy alkot\u00f3elemeik, kezd besziv\u00e1rogni a popul\u00e1ris kult\u00far\u00e1ba, b\u00e1r m\u00e9g mindig fel\u00fcletes m\u00f3don [...]\u201d.<\/p>\n\n\n\n<p><br>Valahogy az el\u0151z\u0151 szerz\u0151k kultur\u00e1lis impregn\u00e1ci\u00f3 kifejez\u00e9se \u2019\u00e9rthetetlen\u00ab kiterjeszt\u00e9ssel volt \u00e1titatva, amely az 1980-as \u00e9vek tipikus nyelv\u00e9hez kapcsol\u00f3dott, amelyben a \u00bbciber\u201c el\u0151tag kiterjedt haszn\u00e1lata nagyon k\u00fcl\u00f6nb\u00f6z\u0151 tev\u00e9kenys\u00e9geket vagy megk\u00f6zel\u00edt\u00e9seket azonos\u00edtott. Fontos azonban megjegyezni, hogy ez az inform\u00e1ci\u00f3 tipikus sz\u00e1m\u00edt\u00f3g\u00e9pes m\u00e9di\u00e1k \u00f6sszekapcsolhat\u00f3s\u00e1g\u00e1hoz \u00e9s sug\u00e1rz\u00e1s\u00e1hoz kapcsol\u00f3dik, amelyeket egy virtu\u00e1lis rendszer sejtjeinek tekintenek. \u201dA kibernetika akkor keletkezik, amikor az effektorok (mondjuk, egy motor, egy g\u00e9p, az izmaink stb.) egy \u00e9rz\u00e9kszervhez kapcsol\u00f3dnak, amely viszont a jeleivel dolgozik az effektorokon,\u201c mondja Von Foerster (2003). Ez a k\u00f6rk\u00f6r\u00f6s szervezet az, ami kibernetikai rendszereket hoz l\u00e9tre [...]\u201d.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"when-did-you-first-mention-cyberspace\">Mikor eml\u00edtetted el\u0151sz\u00f6r a kibert\u00e9r fogalm\u00e1t?<\/h2>\n\n\n<p>Azok a bonyolults\u00e1gok, amelyeket kor\u00e1bban a \u201ckiber\u201d el\u0151tag el\u0151tti szavakban vizualiz\u00e1ltunk, a \u201ckibert\u00e9r\u201d kifejez\u00e9s haszn\u00e1lat\u00e1ban nyilv\u00e1nulnak meg, amely kezdetben nem kapcsol\u00f3dik a \u201ckibernetika\u201d diszciplin\u00e1ris ir\u00e1ny\u00edt\u00e1si elm\u00e9leteihez vagy rendszereihez. Sz\u00e1mos szerz\u0151 1984-re dat\u00e1lja a kifejez\u00e9st, William Gibson fikci\u00f3s munk\u00e1j\u00e1t id\u00e9zve, amelyben a \u201ckibert\u00e9r\u201d \u201cegy konszenzu\u00e1lis hallucin\u00e1ci\u00f3k\u00e9nt van le\u00edrva, amelyet naponta milli\u00e1rdok \u00e9lnek \u00e1t, minden nemzetben, a magas matematikai fogalmakat tan\u00edt\u00f3 gyermekek \u00e1ltal... Az inform\u00e1ci\u00f3 grafikus \u00e1br\u00e1zol\u00e1sa, amelyet az emberi rendszer bankjainak \u00f6sszes sz\u00e1m\u00edt\u00f3g\u00e9p\u00e9b\u0151l nyernek ki. Felfoghatatlan bonyolults\u00e1g.\u201d Ennek a javaslatnak az \u00fajdons\u00e1ga ellen\u00e9re, amit Gibson bemutatott, egy el\u0151\u00e9telt ad arr\u00f3l, hogy mi lenne az \u00f6sszekapcsolt digit\u00e1lis sz\u00ednt\u00e9r n\u00e9h\u00e1ny \u00e9vtizeddel k\u00e9s\u0151bb, ami \u00f6sszhangban van azzal, amit a \u201cNeuromancer\u201d c\u00edm\u0171 munk\u00e1j\u00e1ban javasolt.<\/p>\n\n\n\n<p><br>Bel\u00e9pve egy elm\u00e9letibb ter\u00fcletre, Cicognani megpr\u00f3b\u00e1l behatolni a terminol\u00f3giai m\u00e9lys\u00e9gekbe, hogy javasolja: \u201ca cyber+space kifejez\u00e9sben a t\u00e9r a fizikai anyag jelent\u00e9s\u00e9t veszi fel, m\u00edg a cyber immateri\u00e1lis jellemz\u0151ket ad neki\u201d. Nem volt k\u00f6nny\u0171 \u00f6sszeegyeztetni a fizikai \u00e9s virtu\u00e1lis vil\u00e1gokat, \u00e9s alapos elemz\u0151 gyakorlatot ig\u00e9nyelt, hogy sz\u00e9les\u00edts\u00fck \u00e9s \u00f6sszeomlasszuk azokat a r\u00e9gi paradigm\u00e1kat, amelyek az anyagot k\u00f6telez\u0151nek tett\u00e9k elfogadni val\u00f3s\u00e1gk\u00e9nt.<\/p>\n\n\n\n<p><br>Ez a heves vita a \u201ckibert\u00e9r\u201d felett olyan megfigyel\u00e9seket eredm\u00e9nyezett, mint Post (2013), aki azt \u00e1ll\u00edtja, hogy \u201ca k\u00e9rd\u00e9s, hogy \u2018a kibert\u00e9r val\u00f3ban egy hely-e?\u2019 hasonl\u00f3 ahhoz, hogy megk\u00e9rdezz\u00fck, hogy az \u00e9let a sz\u00e1razf\u00f6ld\u00f6n \u201dazonos-e\u201c vagy \u201dk\u00fcl\u00f6nb\u00f6zik-e\u201c az \u00e9let a tengeren. A v\u00e1lasz az, hogy egyszerre mindkett\u0151. M\u00e9g ha felt\u00e9telezz\u00fck is a kibert\u00e9r elismer\u00e9s\u00e9nek \u00e1ll\u00e1spontj\u00e1t, a k\u00fcl\u00f6nb\u00f6z\u0151 gondolkod\u00e1si \u00e1ramlatok visszat\u00e9rnek egy m\u00e1sik bifurk\u00e1ci\u00f3s elemz\u00e9sbe, amely abb\u00f3l \u00e1ll, hogy a \u201dkibert\u00e9r\u201c absztrakci\u00f3j\u00e1t a t\u00e1rsadalomb\u00f3l \u00e9s az \u201dinstrumentalista\u201c magyar\u00e1zatokra \u00f6sszpontos\u00edtanak, amelyek b\u00e1r fontosak, v\u00e9g\u00fcl el\u00e9gtelenek, megtal\u00e1lva a szisztematikus magyar\u00e1zatokat, mint p\u00e9ld\u00e1ul Folsom (2007), amely r\u00e9szletezi: \u201dbe\u00e1gyazott kapcsol\u00f3h\u00e1l\u00f3zatk\u00e9nt az adatok forgalm\u00e1nak mozgat\u00e1s\u00e1ra, amelyet a kapcsol\u00f3d\u00e1s k\u00fcl\u00f6nb\u00f6z\u0151 fokozatai jellemeznek\u201c.\u201d<\/p>\n\n\n\n<p><br>Azok a meghat\u00e1roz\u00e1sok, amelyek hajlamosak ezt a virtu\u00e1lis teret az emberhez sz\u0171k\u00edteni, kiemelkednek, mert a fogalmi megk\u00f6zel\u00edt\u00e9sek, haszn\u00e1latok \u00e9s hozz\u00e1j\u00e1rul\u00e1sok nem v\u00e1laszthat\u00f3k el t\u00e1rsadalmi l\u00e9nyeg\u00e9t\u0151l, \u00e9s a \u201ckibert\u00e9r\u201d v\u00e9gs\u0151 soron antropikus alkot\u00e1s. \u201cA kibert\u00e9r jellemezhet\u0151 \u00fagy, mint az elektronikus m\u00e9di\u00e1ban haszn\u00e1lt t\u00e9rbeli referencia, de ez felveti annak sz\u00fcks\u00e9gess\u00e9g\u00e9t, hogy mag\u00e1t a teret defini\u00e1ljuk, hogy megtapasztalhassuk, hogyan is a t\u00e9r val\u00f3j\u00e1ban a ment\u00e1lis folyamatok term\u00e9ke,\u201d \u00edrja Anders (2001).<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"the-beginnings-of-security-in-information-environments\">A biztons\u00e1g kezdetei az inform\u00e1ci\u00f3s k\u00f6rnyezetekben<\/h2>\n\n\n<p>Az inform\u00e1ci\u00f3s \u00e9s kommunik\u00e1ci\u00f3s technol\u00f3gi\u00e1k abszol\u00fat dimenzi\u00f3ja, amelyet a t\u00e1rsadalmat alkot\u00f3 k\u00fcl\u00f6nb\u00f6z\u0151 szektorokra kiterjesztettek, els\u00f6pr\u0151v\u00e9 v\u00e1lt, \u00e9s a biztons\u00e1got ez a jelens\u00e9g kezdte befoly\u00e1solni az \u00faj dinamik\u00e1k sz\u00e1m\u00e1nak eredm\u00e9nyek\u00e9nt, amelyek ebb\u0151l eredtek. Caro szerint \u201cahogyan az \u00fagynevezett vil\u00e1gm\u00e9ret\u0171 h\u00e1l\u00f3 vagy World Wide Web fejl\u0151d\u00f6tt, \u00fagy fejl\u0151dtek az \u00e1ltala szembes\u00edtett fenyeget\u00e9sek is.\u201d A strat\u00e9giai elemz\u00e9seknek ebben az \u00e9rtelemben mindig p\u00e1rhuzamosan kell futniuk a fenyeget\u00e9sek \u00fajrakonfigur\u00e1l\u00e1s\u00e1val vagy megjelen\u00e9s\u00e9vel annak \u00e9rdek\u00e9ben, hogy k\u00f6rvonalazz\u00e1k azok vet\u00fclet\u00e9t a biztons\u00e1g \u00e9s v\u00e9delem fel\u00e9. <\/p>\n\n\n\n<p>Amikor Fred Cohen megpr\u00f3b\u00e1lta kijelenteni a sz\u00e1m\u00edt\u00e1stechnika kor\u00e1bban ismeretlen jellemz\u0151j\u00e9t, mint p\u00e9ld\u00e1ul a v\u00edrusokat, az 1984-ben gy\u00f6kerez\u0151 fogalmak kezdetben nem vett\u00e9k \u00e9szre a strat\u00e9giai hat\u00e1st, a kutat\u00f3 meghat\u00e1rozva: \u201cA sz\u00e1m\u00edt\u00f3g\u00e9pes \u201cv\u00edrust\u201d olyan programk\u00e9nt defini\u00e1ljuk, amely \u2018megfert\u0151zhet\u2019 m\u00e1s programokat az\u00e1ltal, hogy m\u00f3dos\u00edtja \u0151ket, hogy egy esetlegesen tov\u00e1bbfejl\u0151d\u00f6tt m\u00e1solat\u00e1t tartalmazza\u201d. Cohen akkori \u00e9rt\u00e9kel\u00e9sei \u00fagy t\u0171ntek, hogy a polg\u00e1ri sz\u00e1m\u00edt\u00e1stechnikai \u00fcgyek technikai jellemz\u00e9s\u00e9re korl\u00e1toz\u00f3dnak, de az elm\u00e9leti asszimil\u00e1ci\u00f3 volt az, ami elind\u00edtotta a \u201ckiberfenyeget\u00e9sek\u201d besz\u00e9d\u00e9t k\u00fcl\u00f6nb\u00f6z\u0151 orsz\u00e1gokban, \u00e9s ez adott alapot a \u201ckiberv\u00e9delemnek\u201d \u00e9s ennek k\u00f6vetkezm\u00e9nyek\u00e9nt a \u201ckiberbiztons\u00e1gnak\u201d.<\/p>\n\n\n\n<p><br>Sz\u00fcks\u00e9ges lenne hozz\u00e1adni a bemutatott technikai v\u00e1ltoz\u00f3hoz a glob\u00e1lis trendet, ahol a lakoss\u00e1g \u00e9s int\u00e9zm\u00e9nyei szorosan kezdtek egy\u00fcttm\u0171k\u00f6dni a kibernetikai rendszerekkel, olyannyira, hogy Castells ezt a kapcsolatot \u00edgy \u00edrta le: \u201caz emberi alanyok test\u00e9nek \u00e9s elm\u00e9j\u00e9nek kiterjeszt\u00e9se \u00e9s n\u00f6veked\u00e9se a szoftvervez\u00e9relt mikroelektronikus kommunik\u00e1ci\u00f3s technol\u00f3gi\u00e1k \u00e1ltal m\u0171k\u00f6dtetett interakci\u00f3s h\u00e1l\u00f3zatokban\u201d. Ez a panor\u00e1ma technol\u00f3giai kitetts\u00e9get mutatott, a fenyeget\u00e9s potenci\u00e1lj\u00e1val egy\u00fctt, amely \u00faj \u00e1rnyalatok megteremt\u00e9s\u00e9hez vezetett az inform\u00e1ci\u00f3biztons\u00e1gban, konkr\u00e9tabb alter\u00fcleteket alkotva, mint p\u00e9ld\u00e1ul az \u00fagynevezett \u201ckiberbiztons\u00e1g\u201d vagy \u201csz\u00e1m\u00edt\u00f3g\u00e9pes kriminalisztika\u201d.<\/p>","protected":false},"excerpt":{"rendered":"<p>We live in the information age, which implies numerous changes in human life, its various social sectors, governments, and states. Everything we have built has been influenced by the digital\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-torteneti-attekintese\/\">Folytat\u00e1s <span class=\"screen-reader-text\">A kiberbiztons\u00e1g t\u00f6rt\u00e9neti \u00e1ttekint\u00e9se<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1340,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-1336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Historical Account of Cybersecurity | Security Briefing<\/title>\n<meta name=\"description\" content=\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-torteneti-attekintese\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Historical Account of Cybersecurity | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-torteneti-attekintese\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-03T21:23:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Historical account of Cybersecurity\",\"datePublished\":\"2023-02-03T21:23:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"},\"wordCount\":1347,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\",\"name\":\"Historical Account of Cybersecurity | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"datePublished\":\"2023-02-03T21:23:33+00:00\",\"description\":\"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Historical account of Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Historical account of Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A kiberbiztons\u00e1g t\u00f6rt\u00e9neti \u00e1ttekint\u00e9se | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Fedezze fel a kiberbiztons\u00e1g fejl\u0151d\u00e9s\u00e9t, a kezdetekt\u0151l az ipar\u00e1g jelenlegi \u00e1llapot\u00e1ig. Ismerje meg a kiberbiztons\u00e1g t\u00f6rt\u00e9net\u00e9nek kih\u00edv\u00e1sait.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-torteneti-attekintese\/","og_locale":"hu_HU","og_type":"article","og_title":"Historical Account of Cybersecurity | Security Briefing","og_description":"Discover the evolution of cybersecurity, from its beginnings to the current state of the industry. Learn about the challenges in the history of cybersecurity.","og_url":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/a-kiberbiztonsag-torteneti-attekintese\/","og_site_name":"Security Briefing","article_published_time":"2023-02-03T21:23:33+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"security","Becs\u00fclt olvas\u00e1si id\u0151":"7 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Historical account of Cybersecurity","datePublished":"2023-02-03T21:23:33+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"},"wordCount":1347,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","articleSection":["cybersecurity"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/","name":"A kiberbiztons\u00e1g t\u00f6rt\u00e9neti \u00e1ttekint\u00e9se | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","datePublished":"2023-02-03T21:23:33+00:00","description":"Fedezze fel a kiberbiztons\u00e1g fejl\u0151d\u00e9s\u00e9t, a kezdetekt\u0151l az ipar\u00e1g jelenlegi \u00e1llapot\u00e1ig. Ismerje meg a kiberbiztons\u00e1g t\u00f6rt\u00e9net\u00e9nek kih\u00edv\u00e1sait.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Historical-account-of-Cybersecurity-2-1.jpg","width":662,"height":327,"caption":"Historical account of Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/historical-account-of-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Historical account of Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"biztons\u00e1g","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin a Government Technology vezet\u0151 munkat\u00e1rsa. Kor\u00e1bban a PYMNTS \u00e9s a The Bay State Banner sz\u00e1m\u00e1ra \u00edrt, \u00e9s a Carnegie Mellon Egyetemen szerzett B.A. diplom\u00e1t kreat\u00edv \u00edr\u00e1sb\u00f3l. Boston k\u00f6rny\u00e9k\u00e9n \u00e9l.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/hu\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1336"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1336\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1340"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}