This Article 
 Bibliographic References 
 Add to: 
Collective Defense: Applying the Public-Health Model to the Internet
March/April 2012 (vol. 10 no. 2)
pp. 54-59
Scott Charney, Microsoft
Governments, enterprises, and consumers face myriad technically advanced and persistent computer threats. Commonly available cyberdefenses such as firewalls, antivirus software, and automatic updates for security patches help reduce the risk from threats. However, they're inadequate because many consumers sometimes ignore the guidance provided or engage in other unsafe actions (such as downloading executable programs from unknown sources). Those with infected computers aren't simply risking their own valuable information and data; they're putting others at risk. One way to address these issues is to use a model similar to the one society uses to address human illness.

1. "When Did the Term 'Computer Virus' Arise?," Scientific American,19 Oct. 2001; www.scientificamerican.comarticle.cfm?id=when-did-the-term-compute .
2. J.O. Kephart, D.M. Chess, and S.R. White, "Computers and Epidemiology," IEEE Spectrum, vol. 20, no. 5, 1993, pp. 20–26.
3. C. Albanesius, "Comcast to Warn PC Users if They're Infected,",8 Oct. 2009;,2817,2354001,00.asp .
4. E. Mills, "Comcast Takes Free Anti-botnet Service Nationwide," CNET News,30 Sept. 2010; http://news.cnet.com8301-27080_3-20018168-245.html#ixzz1133KPVK8 .
5. J.A. Lewis, Securing Cyberspace for the 44th Presidency, tech. report, US Center for Strategic and Int'l Studies, 8 Dec. 2008; .
1. "R.I.P. Waladec: Undoing the Damage of a Botnet," blog, 8 Sept. 2010; archive/2010/09/08r-i-p-waledac-undoing-the-damage-of-a-botnet.aspx .
2. "Taking Down Botnets: Microsoft and the Rustock Botnet," blog, 17 Mar. 2011; archive/2011/03/17taking-down-botnets-microsoft-and-the-rustock-botnet.aspx .

Index Terms:
infrastructure protection, computer security, public health, machine health, health certificates
Scott Charney, "Collective Defense: Applying the Public-Health Model to the Internet," IEEE Security & Privacy, vol. 10, no. 2, pp. 54-59, March-April 2012, doi:10.1109/MSP.2011.152
Usage of this product signifies your acceptance of the Terms of Use.