Content deleted Content added
→Surveillance monitor: added internal links |
m Open access bot: url-access updated in citation with #oabot. |
||
Line 7:
The subversion of [[computer]]s or their unauthorized use is referred to using the terms ''[[cyberwarfare]]'', ''[[cybercrime]]'', or ''[[Security hacker|security hacking]]'' (later shortened to ''hacking'' for further references in this article due to issues with ''[[hacker]]'', ''[[hacker culture]]'' and differences in [[White hat (computer security)|white]]/[[Grey hat|grey]]/[[Black hat (computer security)|black]] 'hat' color identification).
The computer security software products industry was launched in the second half of the 1970s when computer firms and new IT startups chose alternative paths to offer commercial access control systems to organizational mainframe computer users. These developments were led by [[IBM]]'s [[Resource Access Control Facility]] and SKK's Access Control Facility 2.<ref>{{Cite journal |title=The Origin and Early History of the Computer Security Software Products Industry |url=https://ieeexplore.ieee.org/document/7116464 |access-date=2023-12-13 |journal=IEEE Annals of the History of Computing|date=2015 |doi=10.1109/MAHC.2015.21 |last1=Yost |first1=Jeffrey R. |volume=37 |issue=2 |pages=46–58 |url-access=subscription }}</ref>
==Types==
|