Cybersecurity evolution responses | Information Systems homework help

Cybersecurity evolution responses | Information Systems

All posts must be (2) substantive responses with a minimum of 150 words each for Responses 1 and 2. Ensure you list and break down each response in a word document, along with its reference. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.


This week we have been asked to discuss the evolution of the concept and necessity of cybersecurity of the last three decades as well as speculate as to what impact the next decade may have on cybersecurity. While analyzing this topic, the first thing that came to mind was the fact that in the 1980 the idea of the Internet was limited to only a few machines connected to one another located at various universities and government sites. (Crocker, 2019) Relatively speaking, the need for cybersecurity was next to nothing as most of the people who had regular access to the network probably belonged to a small group of people most of which could vouch for one another or having some type of real-world acquaintance or connection. It wasn’t until the integration of many networks on a global scale where simply sending information in the clear started to become a problem and malicious actors could inflict harm to a machine and remain safeguarded through the anonymity afforded by the ever evolving landscape that was cyberspace. Soon, encryption, firewalls, anti-malware, and more cybersecurity products became ubiquitous with cyber technology as a whole as more emphasis was placed on protecting sensitive information and digital resources.

Obviously, it is difficult if not impossible to accurately predict how technology will evolve in the future. However, if I had to hazard a guess I would speculate that as the Internet of Things (IoT) continues to permeate society greater emphasis will be placed on traffic management. Many American households have moved from having one personal computer and wired telephone, to having several dozens of wireless interconnected devices to include a phone, tablet, laptop, security doorbells, thermostats, smart locks, smart garage doors, Bluetooth coffeemakers, smart refrigerators, etc in less than two decades. Securing all of the traffic while simultaneously allotting the proper amount of bandwidth for each device to function as advertised will only continue to grow more difficult as households continue to acquire more wireless technology.


Crocker, S. (2019, October). CSDL: IEEE Computer Society. CSDL | IEEE Computer Society. Retrieved December 15, 2021, from


In the early days of the internet in the 1980’s-1990 viruses and worms were not as large of a threat. The internet was still new and not widely used publicly, therefore not many threats were known of even if they were in existence. However, there were hackers that attacked government and corporate systems stealing data and money. This was simpler due to the lack of security. The 1990’s brought about more public and commercial use of the internet with the availability of the world wide web and publicly available dial-up. This also caused more hackers to spread malware, but anti-virus, and firewalls were assisting in the protection of data. This did not stop all malware exploits from happening as the Melissa virus and Michelangelo virus cost were two that affected thousands of users and thousands of dollars in loss and repairs. The next decade in the 2000’s was when computers were a more normal occurrence, most homes had one and the crimes being committed over the web were treated like crimes. Criminals when caught were charged and served jail time along with fines, at least in the U.S. Malware and hackers began to evolve however, and because the internet was more widely used a payloads ability to spread grew rapidly. Going forward the lessen learned from the past few decades is that along with growth and use of the internet comes evolution to the threats from using it. Today to secure a network defense in depth is used along with pen testing and auditing. The entirety of how a device or program is developed has security in mind and all users are trained in security measures. Cyber security must begin to think like hackers to protect data and systems. Cyberattacks in today’s world can cripple infrastructure, therefore it is imperative to keep the system as secure as possible, always rechecking controls, training staff, and updating programs, and soon offensive and defensive measures in cyber will become the norm to protect data.


Lynett, M. (n.d.). A history of information security from past to present. Document Management Blog. Retrieved January 9, 2022, from,data%20from%20people%20and%20governments%20via%20the%20web.

Malware of the 90s: Remembering the Michelangelo and Melissa viruses. WeLiveSecurity. (2018, November 26). Retrieved January 9, 2022, from

A history of malware: Part four, 2000-2005. Infosec Resources. (2020, October 14). Retrieved January 9, 2022, from

Calculate the price of your order

Select your paper details and see how much our professional writing services will cost.

We`ll send you the first draft for approval by at
Price: $36
  • Freebies
  • Format
  • Formatting (MLA, APA, Chicago, custom, etc.)
  • Title page & bibliography
  • 24/7 customer support
  • Amendments to your paper when they are needed
  • Chat with your writer
  • 275 word/double-spaced page
  • 12 point Arial/Times New Roman
  • Double, single, and custom spacing
  • We care about originality

    Our custom human-written papers from top essay writers are always free from plagiarism.

  • We protect your privacy

    Your data and payment info stay secured every time you get our help from an essay writer.

  • You control your money

    Your money is safe with us. If your plans change, you can get it sent back to your card.

How it works

  1. 1
    You give us the details
    Complete a brief order form to tell us what kind of paper you need.
  2. 2
    We find you a top writer
    One of the best experts in your discipline starts working on your essay.
  3. 3
    You get the paper done
    Enjoy writing that meets your demands and high academic standards!

Samples from our advanced writers

Check out some essay pieces from our best essay writers before your place an order. They will help you better understand what our service can do for you.

Get your own paper from top experts

Order now

Perks of our essay writing service

We offer more than just hand-crafted papers customized for you. Here are more of our greatest perks.

  • Swift delivery
    Our writing service can deliver your short and urgent papers in just 4 hours!
  • Professional touch
    We find you a pro writer who knows all the ins and outs of your subject.
  • Easy order placing/tracking
    Create a new order and check on its progress at any time in your dashboard.
  • Help with any kind of paper
    Need a PhD thesis, research project, or a two-page essay? For you, we can do it all.
  • Experts in 80+ subjects
    Our pro writers can help you with anything, from nursing to business studies.
  • Calculations and code
    We also do math, write code, and solve problems in 30+ STEM disciplines.

Frequently asked questions

Get instant answers to the questions that students ask most often.

See full FAQ
    See full FAQ

    Take your studies to the next level with our experienced specialists

    Hello, we are online 24/7. Leave a message we will reply instantly