" 사이버 보안의 역사

사이버 보안의 역사

2023년 2월 03일 • 보안

우리는 정보 시대에 살고 있으며, 이는 인간의 삶, 다양한 사회 부문, 정부 및 국가에 수많은 변화를 의미합니다. 우리가 구축한 모든 것은 디지털 시대의 영향을 받았으며, 그래서 우리는 정보통신기술을 삶의 인식, 구조화 및 이해에 기여하는 다양한 활동과 연관시킵니다.

우리의 진화적 본성의 결과로, 정보 시대에 안전함을 느낄 권리는 프라이버시, 익명성, 유형 및 무형 자산의 보호를 보장하기 위해 사이버 보안 및 사이버 방어를 개발하도록 우리를 이끕니다. 그렇기 때문에 인간은 사이버 보안 연구, 컴퓨터 법률에 대한 법적 분석, 가상 공간에서의 범죄학적 접근에 대해 더 많이 배우고자 합니다. 이는 정보 보안을 촉진할 필요가 있기 때문이며, 국가와 사회 부문 모두에서 정보 보안이 지식의 소유와 정보의 보안을 보장하기 위한 필수 도구를 제공하는 권리임을 이해하도록 하기 위함입니다. 개인 및 정부 활동 공간뿐만 아니라 사적 및 공적 부문에서도 정보와 예방 조치를 이해하는 것이 중요합니다.

목차

What is the origin of the term “cybernetics”?

The term “cybernetics” is as old as the Greek “polis” or “Parthenon,” indicating that “Cybernetics comes from the Greek v and means “art of piloting a ship,” though Plato used it in The Republic with the meaning “art of directing men” or “art of governing.” The term went unnoticed for centuries until the first decades of the twentieth century, when writers such as Norbert Wiener were forerunners of studies that explain the relationships and differentiations between living beings and man-made structures.

Wiener suggested that the aim of “cybernetics” was the development of “[…] a language and techniques that allow us actually to attack the problem of control and communication in general, but also to find a good repertoire of ideas and techniques to classify its particular manifestations in certain concepts”. It should be noted that Wiener had his first incursions theoretical ones from the hand of Arturo Rosenblueth Stearns, being one of the structuring of the cybernetic foundations highlighting “the problem of man-machine interaction”.

Thus, the foundations of what would become “cybernetics” were laid, which investigated control and communication in human, animal, and machine interrelationships.

Ross Ashby was one of the architects of current reflections during the early stages of “cybernetic” thought, which included biological and physical explanations. Ashby visualized in his work “An Introduction to Cybernetics”, the vastness and connection of the subject, and pointed out that this branch of thought would tend to reveal “[…] a large number of interesting and suggestive parallels between the machine, the brain and society. And it can provide a common language through which discoveries in one field can be easily applied to others.”


These three research factors (machine/brain/society) interact in a way that acts as a transversal axis, resulting in a new set of processes, relationships, and social languages. The scope of application expanded over time, transforming “cybernetics” into a multidisciplinary field. According to Heylighen and Joslyn (2001), “the broad cybernetic philosophy that systems are defined by their abstract relationships, functions, and information flows, rather than their concrete material or components, is beginning to permeate popular culture, albeit in a still superficial way […]”.


Somehow, the previous authors’ expression of cultural impregnation was imbued with a «unintelligible» extension, linked to the idiom typical of the 1980s, in which the extensive use of the prefix “ciber” tended to identify very diverse activities or approaches. However, it is important to note that it is linked to the connectivity and radiality of information that is typical of computational media that are assumed to be cells of a virtual system. “[…] cybernetics arises when the effectors (say, a motor, a machine, our muscles, etc.) are connected to a sensory organ, which in turn works with its signals on the effectors,” says Von Foerster (2003). This circular organization is what gives rise to cybernetic systems […]”.

사이버 공간을 처음 언급한 것은 언제입니까?

Those complexities that we previously visualized in the words that precede the prefix “cyber,” are manifested in the use of the term “cyberspace,” which is not initially linked to the control theories or systems that shaped the “cybernetics” disciplinary. Several authors date the term to 1984, citing William Gibson’s fictional work, in which “cyberspace” is described as “a consensual hallucination experienced daily by billions of legitimate operators, in all nations, by children being taught high mathematical concepts… A graphical representation of information extracted from all of the computers in the human system’s banks. Unfathomable complication.” Despite the novelty of this proposal, what Gibson exposed gives an appetizer of what would certainly be the interconnected digital scenario a few decades later, which is consistent with what was suggested in his work “Neuromancer”.


Entering a more theoretical field, Cicognani tries to break into the terminological depths to propose that: “[…] in the term cyber+space, space assumes the meaning of physical matter, while cyber gives it immaterial characteristics”. It has not been easy to reconcile the physical and virtual worlds, and it has necessitated a thorough analytical exercise to broaden and collapse old paradigms that made the material imperative to accept as real.


This heated debate over “cyberspace” has resulted in observations such as those of Post (2013), who states that “[…] the question ‘is cyberspace really a place’?” is akin to asking whether life on land is “identical to” or “different from” life on the sea. The answer is that it is both at the same time. Even assuming a position of recognition of cyberspace, the various currents of thought fall back into another bifurcation analytical, which consists of abstracting “cyberspace” from the social and focusing on “instrumentalist” explanations, which, while important, end up being insufficient, finding systematic explanations such as those of Folsom (2007), which details it: “[…] as an embedded switched network for moving data traffic, further characterized by varying degrees of connectivity.”


The definitions that tend to address this virtual space, narrowing it with the human, stand out, because conceptualizations, uses, and contributions cannot be separated from its social essence, and “cyberspace” is ultimately an anthropic creation. “We can characterize cyberspace as the spatial reference used in electronic media, but that raises our need to define space itself, so we can experience how space is actually the product of mental processes,” writes Anders (2001).

정보 환경에서의 보안의 시작

The absolute dimension that Information and Communication Technologies were deploying on the various sectors that comprise society became overwhelming, and security began to be affected by this phenomenon as a result of the number of new dynamics that emerged as a result of it. According to Caro, “just as the so-called world web or World Wide Web has evolved, so have the threats it faces.” Strategic analyses, in this sense, must always run concurrently with threat reconfigurations or emergence in order to delineate their projection towards security and defense.

When Fred Cohen ventured to state a previously unknown feature of computing, such as viruses, the concepts rooted in 1984 did not initially notice the strategic impact, specifying the researcher: “We define computer “virus” as a program that can ‘infect’ other programs by modifying them to include a possibly evolved copy of itself.” These appreciations of Cohen at the time seemed to be limited to a technical characterization of civilian computing matters, but theoretical assimilation was what led to the start of talk of “cyber threats” in different countries and this gave rise to “cyber defense” and how consequence to “Cybersecurity”.


It would be necessary to add to the exposed technical variable, the global trend, where the population and its institutions began to interact closely with cybernetic systems, to the point that Castells described this relationship as: “the extension and growth of the body and mind of subjects humans in interaction networks powered by software-operated microelectronic communication technologies”. This panorama showed a technological exposure, together with the potential of a threat that led to the establishment of new nuances in Information Security, constituting more specific sub-areas such as the so-called “Cybersecurity” or “Computer Forensics”.

작성자 아바타

보안

admin은 정부 기술의 선임 스태프 작가입니다. 이전에는 PYMNTS와 베이 스테이트 배너에 글을 썼으며 카네기 멜론에서 문예창작 학사 학위를 받았습니다. 현재 보스턴 외곽에 거주하고 있습니다.

자동 잠금 탭
ko_KRKorean