Learn the history of security with Perspecsys
down
History of security, stone age

THE CAVE MAN AND HIS CLUB

The Stone Age / The Paleolithic Era

Cavemen originally used rocks, fruit, branches, and other natural resources to ward off predators and keep themselves out of harm’s way. Eventually, the cave people finetuned these rudimentary tools and created spears, bows and arrows, and slingshot contraptions to hunt for food and increase their odds of survival.

History of security, stone age

GUARD DOGS

30,000 BC

Most studies suggest the domestication of dogs goes back as far as 30,000 BC. Orphaned wolf pups were rescued by humans and reared alongside babies. Over time, these domesticated wolves evolved into the dog species we know today. Dogs were used for hunting and herding and their loyal personalities led them to become faithful guard dogs.

History of security, building moats

MOAT

AROUND CASTLE

3150 BC

A moat, the large trench or ditch surrounding a castle, was first created to protect the fortress during dangerous times. Dating from ancient Egypt to modern times, they were the first line of defense in keeping people secure.

History of security, industrial revolution

SECURITY GUARDS

Industrial Revolution 1760-1840

As the world became more industrial and militaristic, an increasing number of individuals and businesses began to employ the services of security guards for personal protection. The issue of personal security was critical for members of the royal family as well as members of high society. Over the years, the role of the security guard has evolved to take into account personal safety and the safety of one’s surroundings. The Industrial Revolution sparked an uptick in security guard services as more people owned property. Today, many businesses, such as banks and schools, employ security guards for protection.

HOME SECURITY SYSTEMS/ALARMS

1850’s

Home security systems date back farther than you might imagine. Though moats and armed guards have been in place to protect homes for centuries, with the invention of electricity, the art of home protection was greatly improved. In 1853, the first patent on electro-magnetic alarms meant that businesses and wealthy residents could secure valuables. Magnetic contacts were installed on the windows and doors that, when tripped, would send a signal through the electromagnetic wiring and sound an alarm. These groundbreaking security systems were effective in deterring break-ins from occurring.

History of security, military codes

MILITARY CODE (CRYPTOGRAPHY)

1800’s & 1900’s

Cryptography was a common form of codemaking and codebreaking during the Civil War. Although cryptography has a long and complex history dating back to hieroglyphics in 1900 BC, it wasn't until the 19th century that it developed into the more modern encryption techniques that we use today.

History of security, vaults and safes

VAULTS

18th & 19th Century

Before steel and modern metallurgy techniques popularized vaults, reinforced rooms were used for the highest level of security. As steel became a more popular element for manufacturing, vaults started to appear in banks, large businesses, casinos, schools and military buildings to store intellectual property, money, or even dangerous objects. Modern vaults feature walls more than a foot thick, encased with strengthened concrete. Well-constructed vaults include some of the most complicated locking mechanisms known to man.

History of security, IT security

WRITE-PROTECTION ON FLOPPY DISCS

1990’s

When floppy discs were still prevalent in the tech world, many IT folks employed write protection on floppy discs to protect against someone hacking into a computer or server remotely while the disc was being used, or to prevent you from deleting important files.

Modern security is important for mobile and cloud-based devices

TOKENIZATION

& ENCRYPTION

21st Century

Tokenization & Encryption are processes used to protect information in transit and at rest. It involves either replacing or transforming the original text into a form that is unreadable to unauthorized people. These techniques are used to safeguard sensitive information stored and processed in the cloud/internet, and on mobile and wireless devices.