Skip to main content
. 2016 Oct 1;14(5):305–314. doi: 10.1089/hs.2015.0077

Table 1.

Parallels Between Information from Cyber Intelligence and Disease Surveillance

Subject Malicious Software Infectious Disease
Agents • source code and binaries
• signature or hash functions (eg, MD5, SHA)
• origin, author, intent
• pathogens (eg, virus samples)
• gene sequences
• origin, evolution, etc
Vulnerabilities • outdated systems, hostile or compromised IP addresses, domain names, breach details • susceptible, exposed, infected, and recovered individuals
Defenses • response agencies and officials
• detection, containment, remediation
• response agencies and officials
• detection, infection control, treatment