![]() ![]() ![]() ![]() Operators in each tower would observe the configuration of the adjacent tower through a telescope, and then reproduce them on his own tower. Different configurations of these arms corresponded to different letters, numbers and symbols. The semaphore system (which we talked about in some detail a while ago) consisted of a chains of towers, each of which had a system of movable wooden arms on top. What existed instead was a large data network based on optical telegraphy called the semaphore. In fact, it goes back to the time when there was no internet and wireless telegraphy wasn’t even a thing. But the history of cyber attack goes further than the Morris worm. Every year hundreds of millions of users are hit by cyber attacks that defraud them of their money or their personal information. Today, more than 20 billion devices from laptops to refrigerators and cars to fitness trackers, are connected to the internet providing hackers with an unfathomably large playground. Morris was sentenced to three years probation and 400 hours of community service along with a large fine for his recklessness, thus becoming the first person to be successfully charged under the Computer Fraud and Abuse Act. Morris’s intentions were not malicious-he just wanted to gauze how big the internet was, but the program he created to achieve that had the characteristic behavior of a worm-it replicated itself. Many say that the world’s first cyber attack happened in 1988, when Robert Morris, a 20-something graduate student at Cornell, inadvertently set loose a computer worm that quickly clogged up large sections of the internet. ![]()
0 Comments
Leave a Reply. |