Cybersecurity is constantly evolving as new technologies introduce new vulnerabilities and threat actors develop new techniques to penetrate systems. Much focus in scholarship is on the cyber-offence, while few analyse changes in the cyber-defence posture. Since its inception, defensive information security has introduced new security controls to either prevent, detect, mitigate, or respond to new cyberattacks. More recent measures include implementing machine learning and behavioural analysis, DevSecOps as well as building Zero-Trust architectures, among others.
When studying cyber-incident defence, a paradox becomes apparent: in many cases, low-end security fails are responsible for a majority of breaches, such as default system configurations and credentials or violations of the principle of least privileges. Even security-sensitive organisations such as the US Department of Defense or IT-companies suffer from this paradox. A recent joint report from the US National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) report indicates that such organisations spent large sums on high-end security programs just to be compromised by low-end attacks. The paradox becomes even more pronounced when introducing a longitudinal historical perspective. A US Air Force report from 1972 identifies similar security problems to those we still face today.
These include inadequate hardware and software not designed with security in mind, the issue of managing resource access controls in a multi-user environment that includes remote terminals (aka a cloud infrastructure), malicious insider threats that bypass security controls, as well as the issue of applying timely software patches. In sum: while the IT security industry is rushing to introduce new high-level security controls, the main problems in securing systems seem to be age-old problems. Thus, a historical approach to cyber-security is warranted.
In this talk, we will examine security controls of past decades, shedding light on relevant best practices and recommendations. Starting in the 1950s, we will analyse the emerging technologies of each subsequent decade and ask what changes in IT-security controls these new technologies necessitated and how cyber-security changed in general over the years. Furthermore, the aftermath of selected cyberattacks will be analysed to explore potential shifts in security paradigms beyond those introduced by technological development.