This Article 
 Bibliographic References 
 Add to: 
Cyberpandemics: History, Inevitability, Response
January/February 2009 (vol. 7 no. 1)
pp. 63-67
Bret Michael, Naval Postgraduate School
Jeffrey Voas, Science Applications International
Phil Laplante, Penn State University
As cyberspace has evolved into a large, dynamic, and tangled web of computing devices, engineers often fail to design in dependability properties—such as stability, robustness, and security—at the system level. Consequently, unintentional and malevolent actions taken in cyberspace have affected critical infrastructures in the physical world. These disturbances and systems' resultant undependable behavior can progress and spread like infectious disease-like cyberpandemics.

1. Software 2015: A National Software Strategy to Ensure U.S. Security and Competitiveness, Ctr. for Nat'l Software Studies, 29 Apr. 2005; .
2. E. Nakashima and S. Mufson, "Hackers Have Attacked Foreign Utilities, CIA Analyst Says," The Washington Post,19 Jan. 2008, p. A4.
3. A. Nucci and S. Bannerman, "Controlled Chaos," IEEE Spectrum, vol. 44, no. 12, 2007, pp. 43–48.
4. K. Zelonis, Avoiding the Cyberpandemic: A Public Health Approach to Preventing Malware Propagation, master's thesis, Heinz School, Carnegie Mellon Univ., 8 Dec. 2004.
5. R. Gofin, "Preparedness and Response to Terrorism: A Framework for Public Health Action," European J. Public Health, vol. 15, no. 1, 2005, pp. 100–104.
6. Patterns of Global Terrorism, gov't. report, US Dept. of State, Jan. 1988;
7. J.B. Michael et al., "The Role of Policy in Balancing Outsourcing and Homeland Security," IT Professional, vol. 7, no. 4, 2005, pp. 19–23.
8. J.K. Kaplan, "Colony Collapse Disorder—A Complex Buzz," Agricultural Research, vol. 56, no. 5, 2008, pp. 8-11.
9. J. Voas, "Software Trust," IEEE Trans. Reliability, vol. 57, no. 3, 2008, pp. 409–411.

Index Terms:
Cyperpandemics, critical infrastructures, dependability, it all depends, reliability
Bret Michael, Jeffrey Voas, Phil Laplante, "Cyberpandemics: History, Inevitability, Response," IEEE Security & Privacy, vol. 7, no. 1, pp. 63-67, Jan.-Feb. 2009, doi:10.1109/MSP.2009.4
Usage of this product signifies your acceptance of the Terms of Use.