Risk
10/5/2010
02:51 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Microsoft Proposes Public Health Model For Internet Security

How far can we push the virus metaphor for harmful computer code?

Speaking before the International Security Solutions Europe (ISSE) Conference in Berlin, Germany, on Tuesday, Scott Charney, Microsoft's corporate vice president for trustworthy computing, proposed extending the health metaphor that dominates discussions of dangerous computer code to organizational and national network security policy.

His proposal, laid out in detail in a newly published paper titled "Collective Defense: Applying Public Health Models to the Internet," calls for cyber security efforts modeled on efforts to address human illness.

Indeed, with all the computer viruses on the Internet, it only seems prudent to educate people about STDs (server-transmitted diseases), to promote electronic vaccination, to require some measure device hygiene, and to quarantine infectious computers.

"Simply put, we need to improve and maintain the health of consumer devices connected to the Internet in order to avoid greater societal risk," wrote Charney in a blog post summarizing his speech. "To realize this vision, there are steps that can be taken by governments, the IT industry, Internet access providers, users and others to evaluate the health of consumer devices before granting them unfettered access to the Internet or other critical resources."

On a general level, Charney is rephrasing calls for cooperation to address computer security issues. That's something the public and private sector have been pursuing for years and no doubt will continue to do in the years ahead.

But Charney has more than information sharing among the white hats on his mind. He cites both simple and systematic measures -- the promotion of hand-washing, vaccination requirements for admission to schools, and students being forced to remain at home when sick -- as approaches that should be considered for Internet security.

In his paper, he suggests that devices could be required to present a "health certificate" as a condition for Internet access.

But using health as a metaphor for Internet security is not without problems. In 2009, the U.S. spent 17% of its GDP on healthcare, more than any other developed nation. It's safe to say that few aside from security vendors would favor mapping the healthcare spending model onto Internet security.

What's more, health rules have been misused around the globe in the name of the social good, through efforts to "cure" political prisoners in mental health institutions and through forced medical procedures and medical experiments, for example.

"You always have to be careful with metaphors," said Cindy Cohn, legal director for the Electronic Frontier Foundation. "Metaphors can lead to really bad policy. That doesn't mean what Microsoft is proposing is bad. But the point here is to think hard about what it would mean."

Cohn points to peer-to-peer file sharing as an example of a technology that some people still consider to be harmful. She said she'd be nervous about using health as a security model until the implications are more fully understood.

To Charney's credit, he does note that some circumstances, like the need to preserve human health by making an emergency call from an infected cell phone, might override network health measures. What remains to be determined is when network health concerns might trump other rights we take for granted.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: So this is what happens when The Cloud goes down.
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.