# Chapter two: The Evolution regarding Application Security Application security as we all know it nowadays didn't always exist as a conventional practice. In the early decades regarding computing, security problems centered more about physical access in addition to mainframe timesharing settings than on program code vulnerabilities. To appreciate modern day application security, it's helpful to search for its evolution from the earliest software episodes to the advanced threats of right now. This historical journey shows how every era's challenges formed the defenses plus best practices we have now consider standard. ## The Early Days – Before Spyware and adware Almost 50 years ago and seventies, computers were huge, isolated systems. Security largely meant controlling who could get into the computer space or utilize airport terminal. Software itself seemed to be assumed being trusted if authored by reliable vendors or teachers. The idea associated with malicious code seemed to be basically science fiction – until the few visionary tests proved otherwise. Throughout 1971, an investigator named Bob Thomas created what will be often considered the particular first computer earthworm, called Creeper. Creeper was not harmful; it was a self-replicating program that traveled between networked computers (on ARPANET) and displayed some sort of cheeky message: "I AM THE CREEPER: CATCH ME IN THE EVENT THAT YOU CAN. " This experiment, plus the "Reaper" program invented to delete Creeper, demonstrated that code could move about its own across systems CCOE. DSCI. IN CCOE. DSCI. IN . It absolutely was a glimpse involving things to come – showing that networks introduced brand-new security risks beyond just physical fraud or espionage. ## The Rise regarding Worms and Infections The late nineteen eighties brought the first real security wake-up calls. In 1988, the particular Morris Worm has been unleashed on the early Internet, becoming the particular first widely acknowledged den