
This point is exemplified well by LANs and WANs. What fundamentally changed in the 1980s was the creation of “Us” vs “Them.” Devices were now connected beyond a core group of trusted institutions and Pandora’s Box had unleashed the Internet to everyone. Coincidentally, the infamous Morris Worm was the first crime to be prosecuted under the Act in 1988, the same year that Digital Equipment Corp published details of the first packet-switching firewall.

Then, in 1986, Markus Hess was caught breaking into 400 military computers to sell information to the Soviet KGB, and the US Congress recognized cybercrime by passing the Computer Fraud and Abuse Act. For 15 years, networking technology prolifered and advanced, producing the backbone of the Internet that we use today: TCP/IP, Gateways, IPv4, Ethernet, etc. It was not until much later that cybersecurity was institutionally recognized. In 1971, Bob Thomas released the Creeper Virus, a harmless program that jumped from computer to computer, displaying the message, “I’m the creeper, catch me if you can!” In fact, the first recorded computer virus was a prank. After all, ARPANET was a careful selection of researchers, universities, and government agencies trust was implied. The only security measure in place was physical security to protect equipment and computer rooms. During these times, cybersecurity was not even a word. Winding back the clock to the early days of computer networking, we are brought to the prototypical Internet, ARPANET. We will take a look at early cybersecurity threats in the 1980s, the development of the perimeter security framework, and its shortcomings that birthed Zero Trust in the past decade.

This article will examine its evolution to contextualize the growing consensus that a network-centric, perimeter-based approach to cybersecurity has become insufficient. Zero Trust has gradually emerged over the past two decades as organizations attempted to keep pace with the growing complexity of public and private computing infrastructure. Zero Trust is a conceptual framework for cybersecurity that characterizes the principles required to protect modern organizations with distributed infrastructure, remote workforces, and web connected applications. I played buzzword bingo at RSA 2020, where the phrase dominated the entire venue. Blockchain, IOT, Neural Networks, Edge Computing, Zero Trust.
