Scroll Top
NEWS
NEWS
NEWS

Exploring public health as a frame for cybersecurity

It’s been a privilege to work with CyberGreen as we develop a science and discipline of Cyber Public Health. Today, I want to start with the why, explain how I’m thinking about it, and then talk a little about why I think public health will be a more important model than some of the alternatives. I’ll close with a little on where we’re going but, as they say, watch this space.

 

Why Public Health?

So, why Cyber Public Health? Well, the frame has been tremendously good for humanity. Over the last 150 years, our lifespans have doubled. It’s certainly complex to unwrap all the factors that contribute to that, but it’s hard to dispute that public health’s focus on measuring how long people live has made a large difference. Public health doesn’t stop there. It assesses what leads to a low-quality life: chronic diseases and ailments. It is foolish of us to not ask “what can we learn from those successes?”

Of course, we’ve been using health metaphors for a long time to talk about information computer cybersecurity. We talk about computer viruses and cyber-hygiene, without carefully exploring what’s there. For example, actual hygiene – keeping things clean- is a simple model. We have germ theory to explain why it works, it’s relatively easy to do, and people still have a hard time maintaining discipline to wash their hands with soap for 30 seconds. We know that because scientists in public health study it, rather than simply exhorting people to “be hygienic” and stopping there.

 

Understanding Public Health

My work in Cyber Public Health started over a dozen years ago. I was inspired by Steven Johnson’s book The Ghost Map, and named a project “Broad Street” in its honor. That project switched off the Autorun feature on hundreds of millions of Windows XP machines, and reduced the rate of malware spread by something around 1/4 to 1/3 of the malware. Our predictions about cleaning rates held for about a year, and then deviated. After that, I was inspired by the pandemic to delve back in.

More recently, in looking at Internet Infrastructure Health Metrics, we realized that there was a need for a framework and systematic analysis of what we might take from public health. To start that, we used a popular public health textbook as a framing device and asked “what can we learn from this?” and we learned a tremendous amount

I see this as a starting point — people in public health have been generous with their time, especially as they are somewhat distracted with the pandemic as we’re doing this work.

As we did that work, I was struck by how, well…vital… vital statistics are to public health’s conceptualization of problems. Vital statistics include births, deaths, marriages, and other facts about a population, and enable us to calculate information like prevalence and incidence of a condition. Prevalence is the fraction of a population with a condition at some point in time, and incidence the number of new cases. Measuring such things in information technology is hard. How many Android phones were built, sold, or activated last year? How long is one used? Without such numbers, our ability to assess priority for problems is limited, and scientific papers in leading security conferences will frequently cite analyst firms as justification for their work being important. It’s about the best we can currently do, but it’s not a good situation.

Another tool we’re investigating is the Health Belief Model. This model looks at why people take action for health reasons, and the various complex influences, including their perception of risk (seriousness and likelihood of disease), their perception of how difficult or risky a treatment might be, and other factors which help predict people’s choices. We’re working to adapt it to cyber, because we observe that many things that are “obvious” from a security perspective don’t result in people fixing them, from multi-factor authentication to keeping your enterprise patched.

 

Public Health versus…

There are a lot of metaphors in security. Many people look to military or criminological models, arguing that because we have active, (and sometimes intelligent) adversaries, those models make the most sense. This is wrong. There are many places where people compete in zero-sum games, and there’s no reason to think that either military or criminological models will work well. More importantly, computers have functions outside the realm of conflict, and the engineering, economic and other choices we make as we build and deploy systems are fundamentally driven by those needs. If we design our computers like we design tanks, we’ll get things as expensive and unwieldy as tanks, and maybe as effective when we get to conflict as tanks are proving to be in Ukraine.

 

Public Health as a Future path

As a frame, public health offers great promise. It is reasonable to ask about its strengths and weaknesses, its limits and differences. We are early, but in a world in which ransomware is on the rise and breaches are a daily occurrence, we have little to lose and much to gain by exploring new frames for our work.

Privacy Preferences
When you visit our website, it may store information through your browser from specific services, usually in form of cookies. Here you can change your privacy preferences. Please note that blocking some types of cookies may impact your experience on our website and the services we offer.

PRIVACY POLICY

CyberGreen (“us”, “we”, or “our”) operates the CyberGreen website (the “Website Service”).

This page informs you of our policies regarding the collection, use and disclosure of Personal Information when you use our Website Service.

We will not use or share your information with anyone except as described in this Privacy Policy.

We use your Personal Information for providing and improving the Website Service. By using the Website Service, you agree to the collection and use of information in accordance with this policy. Unless otherwise defined in this Privacy Policy, terms used in this Privacy Policy have the same meanings as in our Terms of Use, accessible at https://www.cybergreen.net.

MANUAL INFORMATION COLLECTION AND USE

While using our Website Service, we may ask you to provide us with certain personally identifiable information that can be used to contact or identify you. Personally identifiable information (“Personal Information”) may include, but is not limited to:

  • Name
  • Email address
  • Affiliation
  • Internet Protocol (“IP”) address/range (if requesting opt out from CyberGreen scans)

BROWSER INFORMATION (LOG DATA)

We collect information that your browser sends whenever you visit our Website Service (“Log Data”). This Log Data may include information such as your computer’s IP address, browser type, browser version, the pages of our Website Service that you visit, the time and date of your visit, the time spent on those pages and other statistics.

COOKIES

Cookies are files with small amounts of data, which may include an anonymous unique identifier. Cookies are sent to your browser from a web site and stored on your computer’s hard drive.

We use cookies to collect, store, and/or correlate information. You can instruct your browser to refuse all cookies or to indicate when a cookie is being sent. However, if you do not accept cookies, you may not be able to use some portions of our Website Service.

SERVICE PROVIDERS

We may employ third-party companies and individuals to facilitate our Website Service, to provide the Website Service on our behalf, to perform Website Service-related services or to assist us in analyzing how our Website Service is used.

These third parties have access to your Personal Information only to perform these tasks on our behalf and are obligated not to disclose or use it for any other purpose.

SECURITY

The security of your Personal Information is important to us, but remember that no method of transmission over the Internet, or method of electronic storage is 100% secure. While we strive to use commercially acceptable means to protect your Personal Information, we cannot guarantee its absolute security.

LINKS TO OTHER SITES

Our Website Service may contain links to other sites that are not operated by us. If you click on a third-party link, you will be directed to that third party’s site. We strongly advise you to review the Privacy Policy of every site you visit.

We have no control over, and assume no responsibility for the content, privacy policies or practices of any third-party sites or services.

CHILDREN’S PRIVACY

Our Website Service does not address anyone under the age of 18 (“Children”).

We do not knowingly collect personally identifiable information from children under 18. If you are a parent or guardian and you are aware that your child has provided us with Personal Information, please contact us. If we discover that a child under 18 has provided us with Personal Information, we will delete such information from our servers immediately.

COMPLIANCE WITH LAWS

We will disclose your Personal Information where required to do so by law or subpoena.

CHANGES TO THIS PRIVACY POLICY

We may update our Privacy Policy from time to time. We will notify you of any changes by posting the new Privacy Policy on this page.

You are advised to review this Privacy Policy periodically for any changes. Changes to this Privacy Policy are effective when they are posted on this page.

CONTACT US

If you have any questions about this Privacy Policy, please contact us.

TERMS OF USE

The CyberGreen Institute (“CyberGreen”) Is a non-profit, charitable organization dedicated to the creation and dissemination of metrics measuring the Cyber health of networks along with related data, metrics, and analysis. We also assist network operators with the adoption of Cyber hygiene best practices and risk remediation. A big part of our mission is the collection, calculation, and public distribution of our CyberGreen Index. The CyberGreen Index and the other data that we publish on this website is released under the Affero General Public License (version 3) (the “License”). The use of License ensures that our data remains freely accessible and freely useable by members of the public. (In rare circumstances, we may use another license to distribute data, in which case the specific data set will not be available without a click-thru notice specifying the specific license that applies.)

We do ask that you cite us properly in any academic work as the source for anything that you take from this website. If you are a commercial firm and wish to incorporate our data into a commercial product, you must acknowledge CyberGreen as the source of the data that you used and provide your customers with a link to this website with simple instructions on how to find the data that you took from our site.

We do not publish personally identifiable information (PII) or other information that implicates third party privacy rights. CyberGreen is committed to being compliant with GDPR. Our compliance efforts have been certified by the Institute for Social Internet Public Policy (ISIPP).

TERMS OF USE

The CyberGreen Institute (“CyberGreen”) Is a non-profit, charitable organization dedicated to the creation and dissemination of metrics measuring the Cyber health of networks along with related data, metrics, and analysis. We also assist network operators with the adoption of Cyber hygiene best practices and risk remediation. A big part of our mission is the collection, calculation, and public distribution of our CyberGreen Index. The CyberGreen Index and the other data that we publish on this website is released under the Affero General Public License (version 3) (the “License”). The use of License ensures that our data remains freely accessible and freely useable by members of the public. (In rare circumstances, we may use another license to distribute data, in which case the specific data set will not be available without a click-thru notice specifying the specific license that applies.)

We do ask that you cite us properly in any academic work as the source for anything that you take from this website. If you are a commercial firm and wish to incorporate our data into a commercial product, you must acknowledge CyberGreen as the source of the data that you used and provide your customers with a link to this website with simple instructions on how to find the data that you took from our site.

We do not publish personally identifiable information (PII) or other information that implicates third party privacy rights. CyberGreen is committed to being compliant with GDPR. Our compliance efforts have been certified by the Institute for Social Internet Public Policy (ISIPP).

TERMS OF USE

The CyberGreen Institute (“CyberGreen”) Is a non-profit, charitable organization dedicated to the creation and dissemination of metrics measuring the Cyber health of networks along with related data, metrics, and analysis. We also assist network operators with the adoption of Cyber hygiene best practices and risk remediation. A big part of our mission is the collection, calculation, and public distribution of our CyberGreen Index. The CyberGreen Index and the other data that we publish on this website is released under the Affero General Public License (version 3) (the “License”). The use of License ensures that our data remains freely accessible and freely useable by members of the public. (In rare circumstances, we may use another license to distribute data, in which case the specific data set will not be available without a click-thru notice specifying the specific license that applies.)

We do ask that you cite us properly in any academic work as the source for anything that you take from this website. If you are a commercial firm and wish to incorporate our data into a commercial product, you must acknowledge CyberGreen as the source of the data that you used and provide your customers with a link to this website with simple instructions on how to find the data that you took from our site.

We do not publish personally identifiable information (PII) or other information that implicates third party privacy rights. CyberGreen is committed to being compliant with GDPR. Our compliance efforts have been certified by the Institute for Social Internet Public Policy (ISIPP).