In this video, you will learn to describe how the movie War Games spurred US President Ronald Reagan to create the first national policy on cybersecurity, describe how 9/11 and the increasing use of computers and smart phones has impacted the need for robust cybersecurity. So how did cyber security processes start? How the governments involve? How they start into the cybersecurity arena? Everything starts with Ronald Reagan. Ronald Reagan was United States president that also who was a Hollywood actor. He asked to the security personnel to their security advisors if something that he saw on the movie could be real. What movie? Let's take a quick look into the movie that Reagan saw and he ask to the advisors. We are in. It thunks I'm falcon. Hello. How can it ask you that? It asks you whatever is programmed to ask you. You want to hear it talk? Yeah. I'll ask it how it feels. I am fine, how are you? Excellent. It has been long time. Can you explain whether you are the user account June, 23rd, 1973. It must have totally died. People sometimes make mistakes. Yes they do. How can it talk? It's not a real voice. This box just interpret signals from the computer and turns them into sound. Shall we play a game? So that movie was war games. It's a pretty old movie actually, but the main argument of the movie was that, someone actually that teenager hack into a computer into the Pentagon and start a game the main computer of the Pentagon. The artificial intelligence that runs that computer understand that this is a war game, but it could or actually use the real missiles and the real nuclear arsenal. So teenager from their home office, from their basement hacked into a computer into the Pentagon and take the ownership of the missiles from their home. So Ronald Reagan asked the advisors, these could be real, this could be happening right now. So they start working on something, they actually work on the first policy for a cybersecurity field in United States that is called the National policy of telecommunication and automated Information Systems Security NSDD155. Then we jump to the 9/11. As soon as the 9/11 happened, a lot of people into the US government started asking, how can we avoid the next 9/11? How can we avoid the next cyber threat that will cause an interruption of for example, the lighting system, forward plans, energy systems on the United State field? The last part of this history class is the use of technology. Thirty years ago, 40 years ago, nobody had a computer in the house, right now, everyone has at least a computer, and at least one cell phone, one smartphone on their house. So there is a lot of people, there is a lot of technology arbiter and there is a lot of information that could be shared, could be stolen, and could be compromised using that technology.