Transcript

The Future of Data Protection & Cybersecurity

Backup And Storage Through The Ages In the 1900s. Today, most cellphones store the equivalent of 400 MILLION COMPUTER PUNCH CARDS COULD STORE JUST CARDS or more 80 BITS OF DATA As our data has grown, concerns about backup, security, and privacy have grown too Data Storage Goes Digital 19500 THE FIRST HARD DRIVES 1956 IBM's RAMAC 305 - MAGNETIC DISK DRIVE Measuring 16 feet tall and weighing over a ton Each drive stored just 3.75 MB of data First storage device allowing random data access eliminating the need to wait for drums or tape to progress to the correct data point Magnetic Disk Drives became the standard for data storage and baokup by the 1960s 1960 1967 FLOPPY DISK 1963 Created by SEMICONDUCTOR RANDOM ACCESS IBM MEMORY (RAM) was patented by Robert Norman & Fairchild 8-inch disks were Semiconductor first sold in 1971 Over the next five years, RAM STORAGE CAPACITY GREW BY 32X – From Floppies allowed people to buy, load, and share data with one another – Sparking a new aftermarket software industry Each floppy stored about 80 KB of data 8 bits to 256 bits per chip 1970 ILLIAC-IV SUPERCOMPUTER THE FIRST COMPUTER TO USE EXCLUSIVELY SEMICONDUCTOR MEMORY 1971 THE FIRST COMPUTER VIRUS: "Creeper" was developed as an experiment - though never used maliciously, the virus inspired a new era in security USE OF SEMICONDUCTORS ALLOWED MEMORY DEVICE TO SHRINK IN SIZE AND OPERATE AT HIGHER SPEEDS paving the way foward personal computers 1978 FIRST BACKUP HOT SITE SUNGARD INFORMATION SYSTEMS As technology replace paper in daily business operations, many came to fear the impact an outage could have on their company DESKTOP BACKUPS Backup and disaster recovery solutions began flooding the market Becomes A Thing 1980 disk 1984 1981 CC BY-SA 3.0 e Ruben de Rijcke APPLE II COMPUTERS IBM launches the reseller channel to expand sales of the 5150 PC disk brought 5-4 inch floppy drives to consumers CC BY-SA 3.0 GLiandrei |1983 RIVEST-SHAMIR-ADLEMAN ALGORITHM (RSA) 1988 1989 DEVELOPED BY MIT First patented cybersecurity technology in the U.S. THE MORRIS WORM DR POPP RANSOMWARE A type of public-key cryptography that formed the basis for data encryption Infected 1 in 10 internet- First known ransomware, spread Enabled secure email and other online transactions connect computers in the first 24 hours through infected floppy disks After lying dormant for 90 Many institutions wiped their systems to destroy the worm The DATABASE WARS power cycles, the malware would lock the infected computer and demand payment for a "software lease" – up to $378 1989 NETWORK-ATTACHED STORAGE (NAS) – AUSPEX Dedicated file-level storage server using ethernet connections Sparked the creation of virus detection software and 1990 inspired a new generation of hackers WITH THE RISE OF Just four years later, NetApp would make backup easier and more affordable CYBERTHREATS CAME A NEW MARKET 1997 STORAGE AREA NETWORKS (SAN) – BROCADE FOR DATA BACKUP SOLUTIONS Connected devices and shared files across servers and operating systems Together NAS and SAN made distance irrelevant to networked storage 1998 INTERNET SMALL COMPUTER SYSTEMS INTERFACE (iscsi) – IBM & cisCO - and fierce competition between database vendors Allowed access to stored data over an internet connection 2000 Made block storage cheaper and easier than it was through SAN 2006 AMAZON WEB SERVICES VIRTUALIZATION (AWS) FIRST CLOUD STORAGE Designed for software developers with innovative "pay per use" pricing Pioneers like VMware, Hyper-V, Virtuozzo, and Parallels introduce virtualization solutions opens the door to added their own cloud Google & increased efficiency, segmentation, and IT agility Microsoft services soon after 2006 MANAGED SERVICE PROVIDERS (MSP) FIRST CLOUD STORAGE AS SERVER DENSITY INCREASES, BACKUP SOLUTIONS BECOME OVERLOADED OR ENHANCED Pioneers including Erick Simpson, Karl Palachuk, Amy Luby, and others proposed the managed services business model AS DATABASES GREW LARGER, SECURITY CONCERNS PROMPTED AN EXPLOSION OF DATA COMPLIANCE REGULATIONS DESIGNED TO PROTECT MSPS provide remote tech systems, often by subscription 2010C CONSUMER DATA AND PRIVACY 2011 MID 2010 SAP HANA RANSOMWARE GOES 2017 INTERNATIONAL as strains SOFTWARE ALLOWS REAL- TIME PROCESSING FOR HIGH VOLUME DATA including Reveton, WannaCry, CryptoLocker, Petya, and GENERATIVE ADVERSARIAL NETWORK (GAN) – DEEPFAKES SamSam earn millions from targets around the world. Integrates with cloud-based databases and custom CREATED ADULT FILMS, by superimposing celebrities' faces using GAN Some specifically target backup processes and tools applications The same tech was used a few months later to create a fake video of Donald Trump giving a speech on climate change in Belgium IN 2019, OVER HALF OF COMPANIES SAID THEY PLAN TO CONTINUE INCREASING SPENDING ON IT SECURITY THOUGH FAKE, THESE FILMS WERE CONVINCING ENOUGH TO RAISE SERIOUS CONCERNS OVER HOW TO DETERMINE DATA'S AUTHENTICITY 20200 2019 THE FUTURE OF Acronis DATA PROTECTION & CYBERSECURITY INTEGRATES DATA PROTECTION AND CYBERSECURITY TECHNOLOGIES TO CREATE CYBER PROTECTION ......... – DEMANDS CYBER PROTECTION As technology advances, INTEGRATED SECURITY will become even more essential NEW TECH BRINGS NEW RISKS 2025 As Al and machine learning increase the value of big data, more data means more opportunities for data breaches 175 ΖΕTΤΑΒΥTES OF DATA WILL BE STORED WORLDWIDE 5G networks will rely on software updates to maintain security mostly through cloud-based data centers 1 in 5 wireless connections A single unsecured loT device can compromise an entire network 41.6 billion loT devices will generate nearly 80 zettabytes of data will use 5G Sources: karlpalachukcom ericksimpson.com backuphistory.com computerhistory.org linkedin.com/in/amycluby britannica.com/topic/RSA-encryption techopediacom/definition/24180/creeper-virus thoughtco.com/computer-punch-cards-4074957v ibm.com/ibm/history/ibm100/us/en/icons/floppy bebusinessed.com/history/history-of-online-storage xinhuanet.com/english/2020-03/10/c_138863365htm searchsap.techtarget.com/definition/HANA-SAP-HANA enterprisestorageforum.com/storage-hardware/iscsi.html CYBER PROTECTION The next step in the world of digital defense Visit Acronis.com to get starfed cybersecurity-insiders.com/a-brief-history-of-cybersecurity engadget.com/2015/11/23/the-history-of-disaster-recovery celerity.com/big-risks-behind-big-data-and-how-prevent-them esecurityplanet.com/network-security/security-compliance.html helpnetsecurity.com/2019/06/21/connected-iot-devices-forecast cio.com/article/2448134/database-wars-the-next-generation.html nytimes.com/2011/08/01/arts/the-clunky-pc-that-started-it-all.html history-computer.com/ModernComputer/Basis/magnetic_drum.html searchitchannel.techtarget.com/definition/managed-service-provider Presented by: Acronis theguardian.com/technology/2018/nov/12/deep-fakes-fake-news-truth brookings.edu/research/why-5g-requires-new-approaches-to-cybersecurity networkworld.com/article/3285906/whats-the-future-of-server-virtualizationhtml fbigov/news/stories/morris-worm-30-years-since-first-major-attack-on-internet-110218 networkworld.com/article/3325397/idc-expect-175-zettabytes-of-data-worldwide-by-2025html esecurityplanet.com/network-security/survey-2019-businesses-accelerate-spending-hiring.html independent.co.uk/news/science/apollo-11-moon-landing-mobile-phones-smartphone-iphone-a8988351.html stuff.co.nz/business/110140212/less-is-not-more-how-much-storage-do-you-need-on-your-smartphone-or-device trendmicrocom/vinfo/gb/security/news/internet-of-things/inside-the-smart-home-iot-device-threats-and-attack-scenarios beckershospitalreview.com/healthcare-information-technology/first-known-ransomware-attack-in-1989-also-targeted-healthcare.html computerworld.com/article/3412271/the-history-of-cloud-computing-a-timeline-of-key-moments-from-the-1960s-to-now.html%23slide5 DEVELOPED RY N NOWSOURCING DOOOO O OGO O 0 0 OO0 O O0 O O O

The Future of Data Protection & Cybersecurity

shared by NowSourcing on May 04
6 views
1 shares
0 comments
In the 1900s, computer punch cards could store just 80 bits of data. Today, most cellphones store the equivalent of 400 million cards or more. Here's a look at backup and storage through the ages.

Publisher

Acronis

Designer

NowSourcing

Category

Technology
Did you work on this visual? Claim credit!

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size