Spies, saboteurs, and other troublemakers have sought to steal financial and business data, as well as state secrets, since the first governments and businesses were formed. Those who obtained unauthorized information could get a competitive business edge; cause financial ruin to businesses, organizations, and individuals; and even threaten the stability of governments.
The first major misuse of technological systems occurred in the telecommunications industry in the 1970s. Hackers (also known as crackers) “cracked” telephone systems and used them to make free phone calls. The possibilities for crime grew as personal computers began to be networked and connected to telephone lines, modems, and the early version of the Internet (then called the ARPANET).
In 1988, the first malicious software program, later called a worm, was released onto the Internet. It caused thousands of connected computers to fail. In late 1988, the release of another worm prompted security experts at the National Computer Security Center (which is part of the National Security Agency), to create the Computer Emergency Response Team (CERT) Coordination Center. This federally funded organization (which is now known as the CERT Division) monitors and reports malicious activity on the Internet. Many consider the founding of the CERT Division as the beginning of the information security industry.
In 1993, the National Information Infrastructure Act was passed. It created federal criminal liability for the theft of trade secrets and for “anyone who intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage.”
In the early 2000s, computer viruses and other computer- and Internet-related illegal activity became more prevalent. This fueled the growth of computer security firms, an increasing emphasis on information security by government agencies, and strong demand for information security analysts.
Today, information security remains a paramount issue in both the private and public sectors. "Our adversaries and strategic competitors will increasingly use cyber capabilities—including cyber espionage, attack, and influence—to seek political, economic, and military advantage over the United States and its allies and partners," according to Worldwide Threat Assessment of the U.S. Intelligence Community, a presentation made by Daniel R. Coats, the then director of national intelligence, on January 29, 2019, to the Senate Select Committe on Intelligence.
- 3-D Printing Specialists
- Accountants
- Agile Coaches or Trainers
- Agricultural Consultants
- App Services Workers
- Artificial Intelligence Specialists
- Audit and Assurance Accountants
- Auditors
- Augmented Reality Developers
- Automation Engineers
- Back-End Developers
- Bank Examiners
- Big Data Developers
- Billing Clerks
- Biometrics Systems Specialists
- Blockchain Developers
- Bookkeeping and Accounting Clerks
- Business Continuity Planners
- Business Development Managers and Directors
- Business Intelligence Analysts
- Business Managers
- Chief Customer Officers
- Chief Executive Officers
- Chief Financial Officers
- Chief Information Officers
- Chief Restructuring Officers
- Chief Robotics Officer
- Clinical Data Managers
- Cloud Engineers
- Compliance Managers
- Computer and Office Machine Service Technicians
- Computer and Video Game Designers
- Computer Network Administrators
- Computer Programmers
- Computer Support Service Owners
- Computer Support Specialists
- Computer Systems Programmer/Analysts
- Computer Trainers
- Computer-Aided Design Drafters and Technicians
- Corporate Climate Strategists
- Credit Analysts
- Cryptocurrency Specialists
- Customer Service Representatives
- Customer Success Managers
- Data Entry Clerks
- Data Processing Technicians
- Data Scientists
- Data Warehousing Specialists
- Database Specialists
- Decision Scientists
- Deepfake Professionals
- Digital Agents
- Digital Designers
- Document Management Specialists
- Driverless Car Engineers
- Electrical Engineering Technologists
- Electrical Engineers
- Electronics Engineering Technicians
- Electronics Engineers
- Electronics Service Technicians
- Embedded Systems Engineers
- Energy Consultants
- Enterprise Architects
- Environmental Consultants
- Ergonomists
- Fiber Optics Technicians
- Financial Analysts
- Financial Consultants
- Financial Institution Officers and Managers
- Financial Institution Tellers, Clerks, and Related Workers
- Financial Quantitative Analysts
- Fraud Examiners, Investigators, and Analysts
- Full Stack Developers/Engineers
- Futurists
- Geospatial Analytics Specialists
- Graphic Designers
- Graphics Programmers
- Hardware Engineers
- Health Care Consultants
- Health Informaticists
- Help Desk Representatives
- Human Resources Consultants
- Industrial Designers
- Information Assurance Analysts
- Information Brokers
- Information Technology Consultants
- Information Technology Project Managers
- Information Technology Security Consultants
- Internet Consultants
- Internet Developers
- Internet Executives
- Internet Marketing and Advertising Consultants
- Internet Quality Assurance Specialists
- Internet Security Specialists
- Internet Store Managers and Entrepreneurs
- Internet Transaction Specialists
- JavaScript Developers
- Life Coaches
- Loss Prevention Managers
- Machine Learning Engineers
- Management Analysts and Consultants
- Market Research Analysts
- Marketing Consultants
- Mathematicians
- Microelectronics Technicians
- Mobile Software Developers
- Network Operations Center Engineers
- Network Operations Center Technicians
- Office Administrators
- Online Gambling Specialists
- Online Journalists
- Online Producers
- Personal Privacy Advisors
- Political Consultants
- Press Secretaries
- Product Development Directors
- Product Management Directors
- Product Managers
- Product Owners
- Professional Hackers
- Project Managers
- Radio Frequency Identification Device Specialists
- Sales Representatives
- Salesforce Developers
- Scrum Masters
- Search Engine Optimization Specialists
- Security Consultants
- Security Guards
- Semiconductor Technicians
- Site Reliability Engineers
- Smart Building Systems Designers
- Social Media Workers
- Software Application Developers
- Software Designers
- Software Engineers
- Software Quality Assurance Testers
- Solutions Architects
- Strategy Managers
- Systems Setup Specialists
- Technical Support Specialists
- Technical Writers and Editors
- Technology Ethicists
- Unity Developers
- User Experience Designers
- Webmasters
- Wireless Service Technicians
- Workplace Diversity Experts