# Chapter two: The Evolution associated with Application Security Software security as all of us know it nowadays didn't always exist as an elegant practice. In the particular early decades associated with computing, security worries centered more upon physical access and even mainframe timesharing settings than on code vulnerabilities. To understand modern day application security, it's helpful to find its evolution from your earliest software episodes to the superior threats of right now. This historical trip shows how every era's challenges designed the defenses and best practices we have now consider standard. ## The Early Times – Before Adware and spyware Almost 50 years ago and seventies, computers were large, isolated systems. Safety measures largely meant controlling who could get into the computer space or use the port. Software itself has been assumed to be dependable if written by reputable vendors or academics. The idea associated with malicious code seemed to be approximately science hype – until the few visionary trials proved otherwise. In 1971, a researcher named Bob Thomas created what is definitely often considered typically the first computer worm, called Creeper. Creeper was not dangerous; it was the self-replicating program that will traveled between networked computers (on ARPANET) and displayed some sort of cheeky message: "I AM THE CREEPER: CATCH ME WHEN YOU CAN. " This experiment, along with the "Reaper" program devised to delete Creeper, demonstrated that code could move upon its own across systems CCOE. DSCI. IN CCOE. DSCI. IN . It had been a glimpse associated with things to are available – showing that networks introduced brand-new security risks past just physical robbery or espionage. ## The Rise regarding Worms and Viruses The late eighties brought the 1st real security wake-up calls. 23 years ago, the Morris Worm seemed to be unleashed around the early Internet, becoming the particular first widely known denial-of-service attack abou