Skip to Main Content

Information Security Analysts


Spies, saboteurs, and other troublemakers have sought to steal financial and business data, as well as state secrets, since the first governments and businesses were formed. Those who obtained unauthorized information could get a competitive business edge; cause financial ruin to businesses, organizations, and individuals; and even threaten the stability of governments.

The first major misuse of technological systems occurred in the telecommunications industry in the 1970s. Hackers (also known as crackers) “cracked” telephone systems and used them to make free phone calls. The possibilities for crime grew as personal computers began to be networked and connected to telephone lines, modems, and the early version of the Internet (then called the ARPANET).

In 1988, the first malicious software program, later called a worm, was released onto the Internet. It caused thousands of connected computers to fail. In late 1988, the release of another worm prompted security experts at the National Computer Security Center (which is part of the National Security Agency), to create the Computer Emergency Response Team (CERT) Coordination Center. This federally funded organization (which is now known as the CERT Division) monitors and reports malicious activity on the Internet. Many consider the founding of the CERT Division as the beginning of the information security industry.

In 1993, the National Information Infrastructure Act was passed. It created federal criminal liability for the theft of trade secrets and for “anyone who intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage.”

In the early 2000s, computer viruses and other computer- and Internet-related illegal activity became more prevalent. This fueled the growth of computer security firms, an increasing emphasis on information security by government agencies, and strong demand for information security analysts.

Today, information security remains a paramount issue in both the private and public sectors. "Our adversaries and strategic competitors will increasingly use cyber capabilities—including cyber espionage, attack, and influence—to seek political, economic, and military advantage over the United States and its allies and partners," according to Worldwide Threat Assessment of the U.S. Intelligence Community, a presentation made by Daniel R. Coats, the then director of national intelligence, on January 29, 2019, to the Senate Select Committe on Intelligence. 

Related Professions