Biology and computers: drawing parallels between immunology and cyber-security - Print Article
ثبت نشده
چکیده
Focusing on biology, it is relatively easy to make generalisations about the similarities of computer viruses and the viruses that infect our bodies, but many of us don't recognise just how much we can learn by thinking more deeply about the biology. Let's explore some of the parallels between these two systems and how our understanding of these parallels is informing cyber-security. The vertebrate immune system – possibly the most complex defence system ever devised – provides many important clues about how to design a successful defence system for computers.
منابع مشابه
The impact of information technology on health
Information Technology (IT) is the study of systems especially computers for storing, retrieving, and sending information. It uses any networking and other physical devices, infrastructures to secure and exchange all forms of electronic data. IT is used globally as a major portion of daily life and we use it nearly every day within organizations for many reasons. Our computers, mobile phones an...
متن کاملCyber situational awareness - A systematic review of the literature
Cyber situational awareness is attracting much attention. It features prominently in the national cyber strategies of many countries, and there is a considerable body of research dealing with it. However, until now, there has been no systematic and up-to-date review of the scientific literature on cyber situational awareness. This article presents a review of cyber situational awareness, based ...
متن کاملPower system DNP3 data object security using data sets
Power system cyber security demand is escalating with the increased number of security incidents and the increased stakeholder participation in power system operations, specifically consumers. Rule-based cyber security is proposed for Distributed Network Protocol (DNP3) outstation devices, with a focus on smart distribution system devices. The security utilizes the DNP3 application layer functi...
متن کاملFrom information security to cyber security
The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of ...
متن کاملFunctional similarities between computer worms and biological pathogens
Computer worms pose a serious threat to computer and network security. Interestingly, they share many common tactics with biological pathogens with respect to infecting and propagating. In this paper, we study the six most common fatal infectious diseasesd measles, malaria, HIV/AIDS, tuberculosis, influenza and the diarrhoeal diseasesdto (1) determine the individual mechanisms and environmental...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017