{"id":10112,"date":"2017-10-26T11:11:31","date_gmt":"2017-10-26T19:11:31","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/10\/26\/news-3885\/"},"modified":"2017-10-26T11:11:31","modified_gmt":"2017-10-26T19:11:31","slug":"news-3885","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/10\/26\/news-3885\/","title":{"rendered":"Our computers, ourselves: digital vs. biological security"},"content":{"rendered":"<p><strong>Credit to Author: Chris Fistonich| Date: Wed, 25 Oct 2017 23:12:05 +0000<\/strong><\/p>\n<p>Though by night I fight malware alongside the rest of the Malwarebytes research team, by day I work as a doctoral student in Immunobiology at Yale University, where I study the development of the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Immune_system\" target=\"_blank\" rel=\"noopener\">immune system<\/a> in your bone marrow. This grants me a unique perspective, as I\u2019ve studied both the evolution of malware over the past decade, and the evolution of the microscopic organisms that make us sick.<\/p>\n<p>\u201cComputer virus\u201d has become the catch-all term that people use to describe all types of malicious software\u2014Trojans, ransomware, adware\u2014you name it. When grandma asks for help with her computer, the phrase \u201cI think there\u2019s a virus\u201d likely rings familiar. A similar pattern also emerges when people describe <em>biological\u00a0<\/em>infections; we often begrudgingly conclude, \u201cI caught a virus,\u201d as we lay painstakingly on the couch waiting for the fever to break.<\/p>\n<p>Studying these two similarly-named phenomena in parallel had led me to the inevitable question: Are these two types of infections so different? Are there parallels we can draw and learn from between computer security and the human immune system?<\/p>\n<h3>Computer viruses vs. biological viruses<\/h3>\n<p>I often like to compare digital polymorphic file-infector viruses (such as <a href=\"https:\/\/en.wikipedia.org\/wiki\/Virut\">Virut<\/a> and <a href=\"https:\/\/en.wikipedia.org\/wiki\/Sality\">Sality<\/a>, both commonly found throughout the past decade) and biological\u00a0retroviruses such as HIV. File-infector viruses add malicious data to your computer&#8217;s files. We unknowingly spread the viral code to other files by launching our favorite programs and sharing infected files with others.<\/p>\n<p>HIV works in an astonishingly similar way. When humans contract HIV, the virus infects a type of cell in the immune system called a T cell. Not only is it an evolutionary snub that our own immune systems get hijacked by this virus, resulting in AIDS, but the virus literally becomes part of us, <a href=\"https:\/\/en.wikipedia.org\/wiki\/HIV_integration\">inserting its viral code into our own DNA<\/a>. Even if the virus is destroyed with treatments such as HAART,\u00a0the treatment is not permanent, since infected cells will produce new copies of the virus.\u00a0This is why HIV patients must continue to receive treatment for their entire lives\u2014humans do not have the luxury of being able to <em>Format C:<\/em>.<\/p>\n<h3><strong>How to clean up\/treat the virus<\/strong><\/h3>\n<p>In the case of a computer virus, or malware, one of the easiest ways to treat an infection is to run a scan with a remediation product (like <a href=\"http:\/\/www.malwarebytes.com\/premium\" target=\"_blank\" rel=\"noopener\">Malwarebytes<\/a>). When\u00a0Malwarebytes does a scan, it takes an incredibly close look at every single file. Is it digitally signed by a known malware author or trying to spoof a digital signature from Google? Does it contain references to known malware websites, perhaps a botnet command and control server? When it finds these indicators, it quarantines the malicious files and prevents them from causing any further damage to your computer.<\/p>\n<p>When we catch a biological virus, our bodies do a similar type of interrogation, trying to find pieces of microbes that look out of place.<\/p>\n<p>We have two major branches of the immune system: first, the <em>innate<\/em> immune system is far older in evolutionary terms. It acts very quickly to mount broad anti-microbial responses. We have sentinel cells that constantly survey all points of entry, from your respiratory tract to your gut. We have evolved methods of quickly detecting and eliminating various bacteria.<\/p>\n<p>The second branch, the <em>adaptive<\/em> immune system, evolved more recently (roughly 450 million years ago) and is much slower to act. Yet, it can respond to a nearly unlimited number of specific threats, and perhaps most importantly, it <em>remembers<\/em> what it has targeted in the past. This memory is why we generally do not get chickenpox multiple times, and how vaccines protect us for decades on end.<\/p>\n<p>The best parallel to this second type of immunity in computer security software is found in newer technologies that utilize machine-learning algorithms to recognize malware based on file-structure or behavioral peculiarities. These technologies constantly improve upon themselves, just as evolution has improved upon previous iterations of organisms since the genesis of life itself.<\/p>\n<h3>Protecting against malware and the flu<\/h3>\n<p>Fighting malware and fighting off real-life infections share the same quintessential goal: how can one distinguish the harmless from the harmful? Put another way, both our software-based and biological-based defenses must be able to tell the difference between themselves (e.g., Windows system files, your own brain cells) and things that are foreign (e.g., Trojan files, influenza virus). Failure in this process results in false positives.<\/p>\n<p>Software false positives, or identifying something as malicious that is not, can have varying results, from mildly annoying (reinstalling software) to terminal (corrupting Windows itself). Similarly, false positives in our own bodies, when our immune systems erroneously attack themselves, can result in debilitating allergic responses and even autoimmune diseases such as multiple sclerosis or Type 1 diabetes.<\/p>\n<p>Doctors often recite Benjamin Franklin&#8217;s quote &#8220;an ounce of prevention is worth a pound of cure.&#8221; This adage holds true for our computers and ourselves. The damage that viruses wreak on people can be irrecoverable. President Franklin Roosevelt became paralyzed due to poliovirus infection. But the development of potent polio vaccines by Jonas Salk and Albert Sabin\u00a0compounded with <a href=\"https:\/\/www.gatesfoundation.org\/What-We-Do\/Global-Development\/Polio\">efforts by the Bill and Melinda Gates Foundation<\/a> half a century later have resulted in the near global eradication of poliovirus.<\/p>\n<p>For our computers&#8217; safety, a similar level of protection is essential, as many of the aforementioned types of malware cause irreparable damage to operating systems, resulting in reformatting the hard drive to fully remove all traces of the infection. Instead we suggest another approach: layers of technology aimed at stopping various types of malware in various stages of attack.<\/p>\n<p>Just as you would use different strategies to promote your own health and prevent disease\u2014from eating healthy to getting active to taking medications to regulate various conditions\u2014using layers of technology increases your chances of preventing damaging infection or theft of sensitive data. From blocking the execution of malicious software, to blocking the mechanisms by which malicious code can exploit vulnerabilities in outdated software, to anticipating the mechanisms that ransomware authors use to seize control of your computer, a layered approach to protection will always be the best method to keep your computer safe.<\/p>\n<p>Thus, the methods that programs such as Malwarebytes for Windows utilize to protect your computer from malicious threats bear a striking resemblance to the mechanisms that have evolved to protect our bodies from bacterial and viral infections. Similarly, the malicious programs that criminal syndicates employ to steal money and identities from unsuspecting people are themselves similar in scope and cowardice to the infection methods that microorganisms have evolved to utilize.<\/p>\n<p>There is much we could learn from how our immune systems work in order to conceptually and practically advance how we protect our computers from the threats of tomorrow.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/our-computers-ourselves-digital-vs-biological-security\/\">Our computers, ourselves: digital vs. biological security<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/our-computers-ourselves-digital-vs-biological-security\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Chris Fistonich| Date: Wed, 25 Oct 2017 23:12:05 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/101\/2017\/10\/our-computers-ourselves-digital-vs-biological-security\/' title='Our computers, ourselves: digital vs. biological security'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/10\/shutterstock_572446138.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>People often wonder how computer and biological viruses are the same. We compare the two, and what our computers and bodies do to fight them\u2014it&#8217;s digital vs. biological security.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/\" rel=\"category tag\">101<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/101\/fyi\/\" rel=\"category tag\">FYI<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/bacteria\/\" rel=\"tag\">bacteria<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hiv\/\" rel=\"tag\">HIV<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/immunity\/\" rel=\"tag\">immunity<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mbam\/\" rel=\"tag\">MBAM<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/virus\/\" rel=\"tag\">virus<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/101\/2017\/10\/our-computers-ourselves-digital-vs-biological-security\/' title='Our computers, ourselves: digital vs. biological security'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/10\/our-computers-ourselves-digital-vs-biological-security\/\">Our computers, ourselves: digital vs. biological security<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10519,15587,10520,3657,16149,3764,16150,11214],"class_list":["post-10112","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-10519","tag-bacteria","tag-fyi","tag-hiv","tag-immunity","tag-malware","tag-mbam","tag-virus"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10112"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10112\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10112"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}