The cyberspace and cyber
security have today reached a position which had initiated a
discussion whether it�s a treat to the mere concept of states. But its
origins were greatly different and mostly weak and vulnerable in
nature. The historical development of the cyber space in relation to
states can be described through three key stages.

1. The age of individual
contribution
The initial stage of Cyber security was the era of individual
contributions. This era spans from the 1940s to the mid-1970s.The era
is characterized with:
Limited number of individuals and private institutions taking steps in
development and research related to cyberspace.
Private funding on research
Limited public knowledge
And limited government interest
During this era key events happened such as
● Nikola Tesla inventions Wireless Communications, Robotics
● Alan Turing inventing the Turing machine- the first personal
computer, enigma machine- which decrypted German coded messages during
the second world war,
● Maurice Wilkins and her team in Cambridge university developing the
first large scale, fully functional digital computer
● ARPANET the first network created by the US forces for the military
purposes.

2. The age of state dependence
The time period between the mid-1970s to the early 21st century can be
identified as the age of state dependence. During this period, we can
observe developments such as The first microprocessor, Email, c
programming, personal computers. States identifying the importance of
the cyber space and establishing government funded institutions to
fund research and experiment. Instead of individuals, state
organizations implementing the progressive steps toward the
development of the cyber space.
The cyberspace and cyber related elements becoming state owned
property
And state gradually letting its citizens use the cyberspace in
controlled capacities.
Simply said the cyberspace becomes a tool of the state.
During this era the world experienced
● The US government installing the GPS system for global consumption
● Cryptologists broke the Enigma machine code for the German
government.
● Turing, and some others
worked towards developing the Bombe. The Enigma machine's use of a
reliably small key space makes it vulnerable to brute force.
● First high-profile
attacks on Microsoft's Windows NT operating system
● Love letter and Love Bug
worm, is a computer worm written in VBScript

3. The age of individual
upheaval
During the early part of the 21st century the cyberspace went through
a major shift. Instead of being fully controlled by the government
individual activism and decentralized control emerged as the new
identity of the cyber space
During this particular era which we are living through right now the
following developments occurred. Initiation of social media such as
twitter and Facebook which drew the public towards the cyber space.
The expansion of technology and knowledge to all parts of the world
The centralized control maintained by several states such as the USA
and Russia declined and the cyberspace became more decentralized. The
world today has become more of a virtual than a realistic and people
seem to be enjoying living in it.

By:
Akila Prabash
Akila is an undergraduate of the National School of Business
Management who is currently following Bachelor of Computer Security,
currently he is working as Intern - Information Security Engineer at
Sri Lanka CERT|CC
|