# Chapter two: The Evolution regarding Application Security Program security as we know it nowadays didn't always exist as an official practice. In the early decades regarding computing, security issues centered more on physical access and mainframe timesharing adjustments than on program code vulnerabilities. To appreciate modern day application security, it's helpful to search for its evolution through the earliest software assaults to the advanced threats of nowadays. This historical quest shows how every era's challenges designed the defenses in addition to best practices we have now consider standard. ## The Early Days and nights – Before Spyware and adware Almost 50 years ago and 70s, computers were large, isolated systems. Safety measures largely meant controlling who could enter the computer space or utilize port. Software itself seemed to be assumed to get dependable if written by reliable vendors or scholars. The idea of malicious code seemed to be approximately science fictional works – until a new few visionary experiments proved otherwise. Throughout 1971, a specialist named Bob Betty created what is usually often considered typically the first computer earthworm, called Creeper. Creeper was not harmful; it was the self-replicating program of which traveled between network computers (on ARPANET) and displayed the cheeky message: "I AM THE CREEPER: CATCH ME WHEN YOU CAN. " This experiment, plus the "Reaper" program invented to delete Creeper, demonstrated that program code could move upon its own across systems CCOE. DSCI. IN CCOE. DSCI. IN . It had been a glimpse regarding things to are available – showing of which networks introduced innovative security risks beyond just physical fraud or espionage. ## The Rise involving Worms and Viruses The late 1980s brought the initial real security wake-up calls. In 1988, the Morris Worm has been unleashed within the early Internet, becoming typically the first widely recognized denial-of-service attack about glob