Biology and computers: drawing parallels between immunology and cyber-security - Print Article

ثبت نشده
چکیده

Focusing on biology, it is relatively easy to make generalisations about the similarities of computer viruses and the viruses that infect our bodies, but many of us don't recognise just how much we can learn by thinking more deeply about the biology. Let's explore some of the parallels between these two systems and how our understanding of these parallels is informing cyber-security. The vertebrate immune system – possibly the most complex defence system ever devised – provides many important clues about how to design a successful defence system for computers.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The impact of information technology on health

Information Technology (IT) is the study of systems especially computers for storing, retrieving, and sending information. It uses any networking and other physical devices, infrastructures to secure and exchange all forms of electronic data. IT is used globally as a major portion of daily life and we use it nearly every day within organizations for many reasons. Our computers, mobile phones an...

متن کامل

Cyber situational awareness - A systematic review of the literature

Cyber situational awareness is attracting much attention. It features prominently in the national cyber strategies of many countries, and there is a considerable body of research dealing with it. However, until now, there has been no systematic and up-to-date review of the scientific literature on cyber situational awareness. This article presents a review of cyber situational awareness, based ...

متن کامل

Power system DNP3 data object security using data sets

Power system cyber security demand is escalating with the increased number of security incidents and the increased stakeholder participation in power system operations, specifically consumers. Rule-based cyber security is proposed for Distributed Network Protocol (DNP3) outstation devices, with a focus on smart distribution system devices. The security utilizes the DNP3 application layer functi...

متن کامل

From information security to cyber security

The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of ...

متن کامل

Functional similarities between computer worms and biological pathogens

Computer worms pose a serious threat to computer and network security. Interestingly, they share many common tactics with biological pathogens with respect to infecting and propagating. In this paper, we study the six most common fatal infectious diseasesd measles, malaria, HIV/AIDS, tuberculosis, influenza and the diarrhoeal diseasesdto (1) determine the individual mechanisms and environmental...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017