One of the best self defence and proactive systems to date is the Human Immune System (HIS). How do we go about re-creating a cyber security solutions that tries to mimic the functionality of the HIS?
The HIS works differently in each person, because it may be primed by previous exposure. One way to apply this on the Internet is to think of the immune system in a different way. That is, it permits the entry of things that are not disallowed. To apply this idea I create a list that contains a relatively small number of permitted websites and click on list elements to access websites. By careful scanning of the Internet environment, perhaps via the limited use of a search engine, the list can be updated to include additional websites that 1) use HTTPS and 2) do not generate 'this site is unsafe' warnings from my security program. The list and the security program combine to 'immunize' my computer from unsafe websites.
Thanks for the information Michael Theobald , you said "I create" is this something that you have already done, oy just a taught process on how to implement this? it sounds interesting intake on what can be done to mimic and learn from the system as time goes by.
The list that I referred to is contained in a self-created HTML document that I access via Firefox. Each element is coded as a set of
tags that contains a pair of tags to provide a reference to an https website. The link also contains a brief text description of the site. An example tag set is shown as follows.
A Site News
When I click on one of these links Firefox uses the https reference to open the site in my browser. This happens even though my HTML document is not, itself, on the Web. I access a limited set of safe, so far, websites that all use the https protocol. I do not generate misspellings when entering addresses into the browser window that might direct me to unsafe fake sites. I do not use websites that I do not know to be safe. As far as I am aware Asite.org does not exist, but I use it here in my example code so that I do not inadvertently provoke hackers to hack.