Risk
10/5/2010
02:51 PM
Connect Directly
LinkedIn
Twitter
Google+
RSS
E-Mail
50%
50%

Microsoft Proposes Public Health Model For Internet Security

How far can we push the virus metaphor for harmful computer code?

Speaking before the International Security Solutions Europe (ISSE) Conference in Berlin, Germany, on Tuesday, Scott Charney, Microsoft's corporate vice president for trustworthy computing, proposed extending the health metaphor that dominates discussions of dangerous computer code to organizational and national network security policy.

His proposal, laid out in detail in a newly published paper titled "Collective Defense: Applying Public Health Models to the Internet," calls for cyber security efforts modeled on efforts to address human illness.

Indeed, with all the computer viruses on the Internet, it only seems prudent to educate people about STDs (server-transmitted diseases), to promote electronic vaccination, to require some measure device hygiene, and to quarantine infectious computers.

"Simply put, we need to improve and maintain the health of consumer devices connected to the Internet in order to avoid greater societal risk," wrote Charney in a blog post summarizing his speech. "To realize this vision, there are steps that can be taken by governments, the IT industry, Internet access providers, users and others to evaluate the health of consumer devices before granting them unfettered access to the Internet or other critical resources."

On a general level, Charney is rephrasing calls for cooperation to address computer security issues. That's something the public and private sector have been pursuing for years and no doubt will continue to do in the years ahead.

But Charney has more than information sharing among the white hats on his mind. He cites both simple and systematic measures -- the promotion of hand-washing, vaccination requirements for admission to schools, and students being forced to remain at home when sick -- as approaches that should be considered for Internet security.

In his paper, he suggests that devices could be required to present a "health certificate" as a condition for Internet access.

But using health as a metaphor for Internet security is not without problems. In 2009, the U.S. spent 17% of its GDP on healthcare, more than any other developed nation. It's safe to say that few aside from security vendors would favor mapping the healthcare spending model onto Internet security.

What's more, health rules have been misused around the globe in the name of the social good, through efforts to "cure" political prisoners in mental health institutions and through forced medical procedures and medical experiments, for example.

"You always have to be careful with metaphors," said Cindy Cohn, legal director for the Electronic Frontier Foundation. "Metaphors can lead to really bad policy. That doesn't mean what Microsoft is proposing is bad. But the point here is to think hard about what it would mean."

Cohn points to peer-to-peer file sharing as an example of a technology that some people still consider to be harmful. She said she'd be nervous about using health as a security model until the implications are more fully understood.

To Charney's credit, he does note that some circumstances, like the need to preserve human health by making an emergency call from an infected cell phone, might override network health measures. What remains to be determined is when network health concerns might trump other rights we take for granted.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4262
Published: 2014-07-28
svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file. NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-...

CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2013-7393
Published: 2014-07-28
The daemonize.py module in Subversion 1.8.0 before 1.8.2 allows local users to gain privileges via a symlink attack on the pid file created for (1) svnwcsub.py or (2) irkerbridge.py when the --pidfile option is used. NOTE: this issue was SPLIT from CVE-2013-4262 based on different affected versions...

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.