The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2012 vol.10)
pp: 54-59
Scott Charney , Microsoft
ABSTRACT
Governments, enterprises, and consumers face myriad technically advanced and persistent computer threats. Commonly available cyberdefenses such as firewalls, antivirus software, and automatic updates for security patches help reduce the risk from threats. However, they're inadequate because many consumers sometimes ignore the guidance provided or engage in other unsafe actions (such as downloading executable programs from unknown sources). Those with infected computers aren't simply risking their own valuable information and data; they're putting others at risk. One way to address these issues is to use a model similar to the one society uses to address human illness.
INDEX TERMS
infrastructure protection, computer security, public health, machine health, health certificates
CITATION
Scott Charney, "Collective Defense: Applying the Public-Health Model to the Internet", IEEE Security & Privacy, vol.10, no. 2, pp. 54-59, March/April 2012, doi:10.1109/MSP.2011.152
REFERENCES
1. "When Did the Term 'Computer Virus' Arise?," Scientific American,19 Oct. 2001; www.scientificamerican.comarticle.cfm?id=when-did-the-term-compute .
2. J.O. Kephart, D.M. Chess, and S.R. White, "Computers and Epidemiology," IEEE Spectrum, vol. 20, no. 5, 1993, pp. 20–26.
3. C. Albanesius, "Comcast to Warn PC Users if They're Infected," PCMag.com,8 Oct. 2009; www.pcmag.com/article20,2817,2354001,00.asp .
4. E. Mills, "Comcast Takes Free Anti-botnet Service Nationwide," CNET News,30 Sept. 2010; http://news.cnet.com8301-27080_3-20018168-245.html#ixzz1133KPVK8 .
5. J.A. Lewis, Securing Cyberspace for the 44th Presidency, tech. report, US Center for Strategic and Int'l Studies, 8 Dec. 2008; http://csis.org/files/media/csis/pubs081208_securingcyberspace_44.pdf .
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool