# Chapter two: The Evolution regarding Application Security Program security as we know it nowadays didn't always can be found as a conventional practice. In the early decades associated with computing, security problems centered more on physical access and even mainframe timesharing handles than on signal vulnerabilities. To appreciate contemporary application security, it's helpful to trace its evolution through the earliest software episodes to the superior threats of nowadays. This historical journey shows how every single era's challenges designed the defenses and even best practices we now consider standard. ## The Early Times – Before Malware In the 1960s and 70s, computers were significant, isolated systems. Safety measures largely meant managing who could enter in the computer area or use the airport terminal. Software itself has been assumed to be dependable if authored by reputable vendors or scholars. The idea associated with malicious code has been basically science fiction – until the few visionary studies proved otherwise. In 1971, a specialist named Bob Thomas created what is often considered typically the first computer earthworm, called Creeper. Creeper was not damaging; it was a self-replicating program that will traveled between networked computers (on ARPANET) and displayed the cheeky message: "I AM THE CREEPER: CATCH ME IN CASE YOU CAN. " This experiment, along with the "Reaper" program created to delete Creeper, demonstrated that computer code could move in its own around systems CCOE. DSCI. IN CCOE. DSCI. IN . It absolutely was a glimpse regarding things to come – showing that will networks introduced new security risks over and above just physical theft or espionage. ## The Rise regarding Worms and Infections The late nineteen eighties brought the initial real security wake-up calls. In 1988, typically the Morris Worm was unleashed within the early Internet, becoming the particular first widely known denial-of-service attack on global networ