SlideShare a Scribd company logo
How We Got Here: A History of
Computer Security And Its Design
A collaborative team of innovators, thinkers and problem solvers.
We create impactful mobile apps that solve real-world problems.
Who is Dogtown Media?
● 10+ years as an ethical hacker eventually running my own company
● Started another security company looking after high net-worth
individuals digital assets.
● Co-Founder @dogtownmedia
Who is Rob Pope?
Focus on End-User
History of Hacking
Hacking Today
Hacking the Future
What We’ll Cover
The End User
Let’s focus on Security UX Design in Three Core Areas….
Web Personal Computer Mobile Device
History of Hacking
Pre-Internet Era Web 1.0 / 2G Web 2.0 / 3G
Pre-Internet Era
The early world of hacking
on “computer systems”
Phreakers used audio
frequencies to manipulate
telephone systems
1960’s
Phreaking
phreak is a sensational spelling of the word freak with the ph- from phone
· From Van Nuys, CA
· At 12 he “hacked” the LA bus system by social engineering and dumpster diving to
bypass the punch card system
· At 16 he broke into the “Ark” computer system developed by DEC and copied their
software - resulting in arrest + 12 mo. jail + 3 yrs. supervision
· Caught hacking Pacific bell v/m computers (violating terms of arrest), went on
the run for 2.5 years and:
· Broke into dozens of computer systems
· Stole 100s of cell phones
· Forged 100s of fake IDs
· Served 5 years in prison including 8 months solitary confinement.
· Now successful author, speaker and security expert
Hacking Pioneers
Kevin Mitnick
Early
Connection
Direct dial up modems
became popular
80’s hackers
Web 1.0 / 2G
1990’s Internet Gains Mass Appeal
User accounts, sign ups, and forgotten passwords...
amazon.com
FinTech
ebay.com Yahoo
User Account Hacking
Tools to automate hacking user accounts appeared
Desktops
Windows dominated the market
Incomprehensible messages
Do i want to continue using this?
You will also have access to your
own web portal where you can log
tickets in real time.
Password 12345? sure that's fine
Anti-virus main security tool Password policy non-existent
Microsoft Bob ?!?!
Screens showing a "house", with "rooms" that the user could go to containing familiar objects
corresponding to computer applications!!
Windows Account Hacking
90’s Windows - Candystore for Hackers
Cell phones
2G Phone
Not much data to secure
· Contacts
· SMS
· Voice
· Calls
90’s hackers
Web 2.0 / 3G
Web 2.0 Security Response
Protection to Stop Brute Force password attacks
Personal Computers
Communicate with normal people
Comprehensible messages Cleaner design Password managers
Smart phones
3G phones
Even more data to secure
● Emails
● Photos
2000’s hackers
Hacking Today
Current Web Practices
Passwords Aren’t Enough
Password Changes
Complex Passwords are out, kind of….
Passwords obtained from
previous breach
corpuses.
Repetitive or sequential
characters (e.g. ‘aaaaaa’,
‘1234abcd’).
Context-specific
words, such as the
name of the service,
the username, and
derivatives thereof.
Dictionary words
Password Changes
Complex Passwords are out, kind of….
SMS is Not Safe
· Sim swapping
· SS7
Personal Computers
Cloud accounts
Cloud Accounts Password Managers
Smart Phones
5G phones
Even more data to secure...
● 5G
● Payments
● Cloud accounts
· More Biometrics - Signals from living people such as EKG
· Machine learning used in identification of multiple factors
· Intelligent chatbots replace sign and log-in functions
2010’s hackers
Hacking the Future
Future threats
● Quantum computing - Cryptography will need to adapt.
● Machine learning / AI - Utilized against security measures.
● IOT / Home automation - Integrated into our lives.
● Transport increasing tech dependent
2020’s hackers?
Questions?
References
· Password API - https://nist.badpasswordcheck.com
· Berkeley centre for long term cybersecurity - https://cltc.berkeley.edu/scenarios2020
· How to defend from a SIM Swapping attack - https://www.wired.com/story/sim-swap-attack-defend-phone
· SS7 hack explained: what can you do about it? -
https://www.theguardian.com/technology/2016/apr/19/ss7-hack-explained-mobile-phone-vulnerability-sno
oping-texts-calls

More Related Content

PPTX
Cyber Security for 5th and 6th Graders
PPTX
Cyber crime
PPT
Power Point Hacker
PDF
Hackers Hit Web Host
PDF
Cybersecurity Awareness Training Presentation v1.0
PPTX
Vishwadeep Presentation On NSA PRISM Spying
PDF
Cyber Space Threats and Opportunities
PPTX
Cyber Space Operation- Offensive Cyber Space Operation
Cyber Security for 5th and 6th Graders
Cyber crime
Power Point Hacker
Hackers Hit Web Host
Cybersecurity Awareness Training Presentation v1.0
Vishwadeep Presentation On NSA PRISM Spying
Cyber Space Threats and Opportunities
Cyber Space Operation- Offensive Cyber Space Operation

What's hot (19)

PPTX
Toastmasters - Securing Your Smartphone
PPTX
Cybersecurity Awareness Training
PDF
Internet Safety Glossary of Terms
PDF
Cybersecurity
PDF
The Secret Of Hacking Trial Pages
PPTX
Cybercrime
PPTX
Sit presentation - Hacking
PPTX
Social engineering hacking attack
PPTX
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
PPTX
Hacking and Penetration Testing - a beginners guide
PPTX
Social engineering
PPTX
Cyber crime
PDF
Mobile security hakin9_Revista
PPT
Rothke Sia 2006
PDF
secureIoT Presentation #2 redo
PPTX
Internet security
PPSX
Cyber security awareness for students
PPTX
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
PDF
secureIoT Presentation #2
Toastmasters - Securing Your Smartphone
Cybersecurity Awareness Training
Internet Safety Glossary of Terms
Cybersecurity
The Secret Of Hacking Trial Pages
Cybercrime
Sit presentation - Hacking
Social engineering hacking attack
Social engineering 101 or The Art of How You Got Owned by That Random Stranger
Hacking and Penetration Testing - a beginners guide
Social engineering
Cyber crime
Mobile security hakin9_Revista
Rothke Sia 2006
secureIoT Presentation #2 redo
Internet security
Cyber security awareness for students
Cyber Security Method (Deep - Dig) & challenge's ppt by G S Shaktawat
secureIoT Presentation #2
Ad

Similar to How We Got Here: A History of Computer Security And Its Design (20)

PDF
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
PPTX
Lecture about network and host security to NII students
PPT
The Top 10/20 Internet Security Vulnerabilities – A Primer
PDF
E security and payment 2013-1
PPTX
beware of Thing Bot
DOCX
Webinar Security: Apps of Steel transcription
PPTX
Cyber Crime and Security
PDF
Your money or your files
PPTX
PP Lec15n16 Sp2020.pptx
PPTX
Professional Practices PPT Slide on Chapter 5: Crime
PDF
ccs12-18022310494mghmgmyy3 (1).pdf
PDF
Malicious malware breaches - eScan
PPTX
Ethical hacking
PDF
Ransomware hostage rescue manual
PPTX
Ipr in cyberspace
DOCX
Hamza
PPT
Cyber ppt
PPTX
You think you are safe online. Are You?
PDF
Ransomware ly
PDF
Security
Hacking the Company : Risks with carbon-based lifeforms using vulnerable systems
Lecture about network and host security to NII students
The Top 10/20 Internet Security Vulnerabilities – A Primer
E security and payment 2013-1
beware of Thing Bot
Webinar Security: Apps of Steel transcription
Cyber Crime and Security
Your money or your files
PP Lec15n16 Sp2020.pptx
Professional Practices PPT Slide on Chapter 5: Crime
ccs12-18022310494mghmgmyy3 (1).pdf
Malicious malware breaches - eScan
Ethical hacking
Ransomware hostage rescue manual
Ipr in cyberspace
Hamza
Cyber ppt
You think you are safe online. Are You?
Ransomware ly
Security
Ad

Recently uploaded (20)

PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Tartificialntelligence_presentation.pptx
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
August Patch Tuesday
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
TLE Review Electricity (Electricity).pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
A Presentation on Touch Screen Technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
DP Operators-handbook-extract for the Mautical Institute
OMC Textile Division Presentation 2021.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Programs and apps: productivity, graphics, security and other tools
Tartificialntelligence_presentation.pptx
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
August Patch Tuesday
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Enhancing emotion recognition model for a student engagement use case through...
TLE Review Electricity (Electricity).pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
cloud_computing_Infrastucture_as_cloud_p
A Presentation on Touch Screen Technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Hindi spoken digit analysis for native and non-native speakers
SOPHOS-XG Firewall Administrator PPT.pptx
MIND Revenue Release Quarter 2 2025 Press Release
DP Operators-handbook-extract for the Mautical Institute

How We Got Here: A History of Computer Security And Its Design

  • 1. How We Got Here: A History of Computer Security And Its Design
  • 2. A collaborative team of innovators, thinkers and problem solvers. We create impactful mobile apps that solve real-world problems. Who is Dogtown Media? ● 10+ years as an ethical hacker eventually running my own company ● Started another security company looking after high net-worth individuals digital assets. ● Co-Founder @dogtownmedia Who is Rob Pope?
  • 3. Focus on End-User History of Hacking Hacking Today Hacking the Future What We’ll Cover
  • 4. The End User Let’s focus on Security UX Design in Three Core Areas…. Web Personal Computer Mobile Device
  • 5. History of Hacking Pre-Internet Era Web 1.0 / 2G Web 2.0 / 3G
  • 7. The early world of hacking on “computer systems” Phreakers used audio frequencies to manipulate telephone systems 1960’s Phreaking phreak is a sensational spelling of the word freak with the ph- from phone
  • 8. · From Van Nuys, CA · At 12 he “hacked” the LA bus system by social engineering and dumpster diving to bypass the punch card system · At 16 he broke into the “Ark” computer system developed by DEC and copied their software - resulting in arrest + 12 mo. jail + 3 yrs. supervision · Caught hacking Pacific bell v/m computers (violating terms of arrest), went on the run for 2.5 years and: · Broke into dozens of computer systems · Stole 100s of cell phones · Forged 100s of fake IDs · Served 5 years in prison including 8 months solitary confinement. · Now successful author, speaker and security expert Hacking Pioneers Kevin Mitnick
  • 9. Early Connection Direct dial up modems became popular
  • 11. Web 1.0 / 2G
  • 12. 1990’s Internet Gains Mass Appeal User accounts, sign ups, and forgotten passwords... amazon.com FinTech ebay.com Yahoo
  • 13. User Account Hacking Tools to automate hacking user accounts appeared
  • 14. Desktops Windows dominated the market Incomprehensible messages Do i want to continue using this? You will also have access to your own web portal where you can log tickets in real time. Password 12345? sure that's fine Anti-virus main security tool Password policy non-existent
  • 15. Microsoft Bob ?!?! Screens showing a "house", with "rooms" that the user could go to containing familiar objects corresponding to computer applications!!
  • 16. Windows Account Hacking 90’s Windows - Candystore for Hackers
  • 17. Cell phones 2G Phone Not much data to secure · Contacts · SMS · Voice · Calls
  • 19. Web 2.0 / 3G
  • 20. Web 2.0 Security Response Protection to Stop Brute Force password attacks
  • 21. Personal Computers Communicate with normal people Comprehensible messages Cleaner design Password managers
  • 22. Smart phones 3G phones Even more data to secure ● Emails ● Photos
  • 26. Password Changes Complex Passwords are out, kind of…. Passwords obtained from previous breach corpuses. Repetitive or sequential characters (e.g. ‘aaaaaa’, ‘1234abcd’). Context-specific words, such as the name of the service, the username, and derivatives thereof. Dictionary words
  • 27. Password Changes Complex Passwords are out, kind of….
  • 28. SMS is Not Safe · Sim swapping · SS7
  • 29. Personal Computers Cloud accounts Cloud Accounts Password Managers
  • 30. Smart Phones 5G phones Even more data to secure... ● 5G ● Payments ● Cloud accounts
  • 31. · More Biometrics - Signals from living people such as EKG · Machine learning used in identification of multiple factors · Intelligent chatbots replace sign and log-in functions
  • 34. Future threats ● Quantum computing - Cryptography will need to adapt. ● Machine learning / AI - Utilized against security measures. ● IOT / Home automation - Integrated into our lives. ● Transport increasing tech dependent
  • 37. References · Password API - https://nist.badpasswordcheck.com · Berkeley centre for long term cybersecurity - https://cltc.berkeley.edu/scenarios2020 · How to defend from a SIM Swapping attack - https://www.wired.com/story/sim-swap-attack-defend-phone · SS7 hack explained: what can you do about it? - https://www.theguardian.com/technology/2016/apr/19/ss7-hack-explained-mobile-phone-vulnerability-sno oping-texts-calls