Table 1.
Subject | Malicious Software | Infectious Disease |
---|---|---|
Agents | • source code and binaries • signature or hash functions (eg, MD5, SHA) • origin, author, intent |
• pathogens (eg, virus samples) • gene sequences • origin, evolution, etc |
Vulnerabilities | • outdated systems, hostile or compromised IP addresses, domain names, breach details | • susceptible, exposed, infected, and recovered individuals |
Defenses | • response agencies and officials • detection, containment, remediation |
• response agencies and officials • detection, infection control, treatment |