How Cybersecurity Worked Before 1970