https://github.com/ShiftLeftSecurity/codepropertygraph # Chapter a couple of: The Evolution associated with Application Security Application security as all of us know it right now didn't always exist as a formal practice. In typically the early decades regarding computing, security issues centered more upon physical access and even mainframe timesharing adjustments than on computer code vulnerabilities. To understand modern application security, it's helpful to search for its evolution from the earliest software problems to the complex threats of nowadays. This historical trip shows how each era's challenges formed the defenses plus best practices we have now consider standard. ## The Early Days – Before Adware and spyware Almost 50 years ago and seventies, computers were huge, isolated systems. Safety largely meant handling who could get into the computer room or utilize the airport. Software itself had been assumed being trusted if written by reputable vendors or teachers. The idea associated with malicious code seemed to be pretty much science fictional works – until the few visionary tests proved otherwise. Inside 1971, a specialist named Bob Thomas created what is definitely often considered the particular first computer worm, called Creeper. Creeper was not harmful; it was the self-replicating program that will traveled between networked computers (on ARPANET) and displayed a cheeky message: "I AM THE CREEPER: CATCH ME IF YOU CAN. " This experiment, along with the "Reaper" program invented to delete Creeper, demonstrated that signal could move on its own throughout systems CCOE. DSCI. IN CCOE. DSCI. IN . It had been a glimpse of things to are available – showing that will networks introduced innovative security risks over and above just physical thievery or espionage. ## The Rise of Worms and Infections The late nineteen eighties brought the very first real security wake-up calls. 23 years ago, typically the Morris Worm was unleashed around the earlier Intern