Spies, saboteurs, and other troublemakers have sought to steal financial and business data, as well as state secrets, since the first governments and businesses were formed. Those who obtained unauthorized information could get a competitive business edge; cause financial ruin to businesses, organizations, and individuals; and even threaten the stability of governments.
The first major misuse of technological systems occurred in the telecommunications industry in the 1970s. Hackers (also known as crackers) “cracked” telephone systems and used them to make free phone calls. The possibilities for crime grew as personal computers began to be networked and connected to telephone lines, modems, and the early version of the Internet (then called the ARPANET).
In 1988, the first malicious software program, later called a worm, was released onto the Internet. It caused thousands of connected computers to fail. In late 1988, the release of another worm prompted security experts at the National Computer Security Center (which is part of the National Security Agency), to create the Computer Emergency Response Team (CERT) Coordination Center. This federally funded organization (which is now known as the CERT Division) monitors and reports malicious activity on the Internet. Many consider the founding of the CERT Division as the beginning of the information security industry.
In 1993, the National Information Infrastructure Act was passed. It created federal criminal liability for the theft of trade secrets and for “anyone who intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage.”
In the early 2000s, computer viruses and other computer- and Internet-related illegal activity became more prevalent. This fueled the growth of computer security firms, an increasing emphasis on information security by government agencies, and strong demand for information security analysts.
Today, information security remains a paramount issue in both the private and public sectors. "Our adversaries and strategic competitors will increasingly use cyber capabilities—including cyber espionage, attack, and influence—to seek political, economic, and military advantage over the United States and its allies and partners," according to Worldwide Threat Assessment of the U.S. Intelligence Community, a presentation made by Daniel R. Coats, the then director of national intelligence, on January 29, 2019, to the Senate Select Committe on Intelligence.
- 3-D Printing Specialists
- Accountants
- Agricultural Consultants
- Artificial Intelligence Specialists
- Audit and Assurance Accountants
- Auditors
- Augmented Reality Developers
- Bank Examiners
- Big Data Developers
- Billing Clerks
- Biometrics Systems Specialists
- Blockchain Developers
- Bookkeeping and Accounting Clerks
- Business Continuity Planners
- Business Development Managers and Directors
- Business Intelligence Analysts
- Business Managers
- Chief Customer Officers
- Chief Executive Officers
- Chief Financial Officers
- Chief Information Officers
- Clinical Data Managers
- Compliance Managers
- Computer and Office Machine Service Technicians
- Computer and Video Game Designers
- Computer Network Administrators
- Computer Programmers
- Computer Support Service Owners
- Computer Support Specialists
- Computer Systems Programmer/Analysts
- Computer Trainers
- Computer-Aided Design Drafters and Technicians
- Corporate Climate Strategists
- Credit Analysts
- Customer Service Representatives
- Customer Success Managers
- Data Entry Clerks
- Data Processing Technicians
- Data Scientists
- Data Warehousing Specialists
- Database Specialists
- Digital Agents
- Digital Designers
- Document Management Specialists
- Electrical and Electronics Engineers
- Electrical Engineering Technologists
- Electronics Engineering Technicians
- Electronics Service Technicians
- Embedded Systems Engineers
- Energy Consultants
- Environmental Consultants
- Ergonomists
- Fiber Optics Technicians
- Financial Analysts
- Financial Consultants
- Financial Institution Officers and Managers
- Financial Institution Tellers, Clerks, and Related Workers
- Financial Quantitative Analysts
- Fraud Examiners, Investigators, and Analysts
- Full Stack Developers/Engineers
- Futurists
- Graphic Designers
- Graphics Programmers
- Hardware Engineers
- Health Care Consultants
- Help Desk Representatives
- Human Resources Consultants
- Industrial Designers
- Information Assurance Analysts
- Information Brokers
- Information Technology Consultants
- Information Technology Project Managers
- Information Technology Security Consultants
- Internet Consultants
- Internet Developers
- Internet Executives
- Internet Marketing and Advertising Consultants
- Internet Quality Assurance Specialists
- Internet Security Specialists
- Internet Store Managers and Entrepreneurs
- Internet Transaction Specialists
- Loss Prevention Managers
- Machine Learning Engineers
- Management Analysts and Consultants
- Market Research Analysts
- Marketing Consultants
- Mathematicians
- Microelectronics Technicians
- Mobile Software Developers
- Office Administrators
- Online Journalists
- Online Producers
- Personal Privacy Advisors
- Press Secretaries and Political Consultants
- Product Development Directors
- Product Management Directors
- Product Managers
- Professional Hackers
- Radio Frequency Identification Device Specialists
- Sales Representatives
- Search Engine Optimization Specialists
- Security Consultants and Guards
- Semiconductor Technicians
- Site Reliability Engineers
- Smart Building Systems Designers
- Social Media Workers
- Software Application Developers
- Software Designers
- Software Engineers
- Software Quality Assurance Testers
- Solutions Architects
- Strategy Managers
- Systems Setup Specialists
- Technical Support Specialists
- Technical Writers and Editors
- Unity Developers
- User Experience Designers
- Webmasters
- Wireless Service Technicians