top of page

Metaphors Matter: Cyber War vs. Cyber Hygiene

  • Phil Venables
  • Sep 6
  • 4 min read

Updated: Sep 8

Cybersecurity is a field built on metaphor. We wage "cyber wars," build "digital fortresses," and practice "cyber hygiene." These phrases aren't just catchy buzzwords; they are the mental shortcuts we use to understand a complex and abstract world.


But what if the shortcuts are leading us down the wrong path? A powerful metaphor can clarify what needs to be done, but a poor one can blind us to the real issues and steer us toward counterproductive solutions. The words we choose build the reality we operate in.


The Science of Metaphor: From Crime to Disease

There's strong research on how metaphors shape our decisions. In a 2011 study, Stanford researchers Paul Thibodeau and Lera Boroditsky gave 1,482 people a report on crime in a fictional city. The text was identical, except for one key change.


  • For one group, crime was a "wild beast preying on the city."


  • For the other, crime was a "virus infecting the city."


When asked for solutions, the results were stark. Those who read about the "beast" overwhelmingly suggested enforcement: capture, punish, and cage. But those who read about the "virus" were far more balanced, suggesting social reforms and root-cause solutions in addition to enforcement. Simply changing the metaphor from "beast" to "virus" produced a 70% increase in support for wider, systemic solutions.


Similarly, a 2015 study found that framing the risk of cancer as an "enemy" to be fought made people less likely to adopt restrictive health measures for prevention (like cutting back on alcohol). Framing it as an "imbalance" to be corrected was significantly more motivating, perhaps because it gave people a greater sense of control.


So, what happens when we apply this lens to the metaphors we use every day in cybersecurity?


A Critical Look at Our Cybersecurity Playbook

Let's dissect some of our field's most common metaphors.


1. Cyber War


  • Why It Works: The idea of an "arms race" against adaptive adversaries—nation-states, criminal syndicates—is a powerful and accurate model. It correctly frames the conflict as a continuous escalation, requiring strategic thinking, deception, and deterrence. Unlike most other risk disciplines, we face intelligent opponents, and this metaphor captures that.


  • Where It Breaks Down: The "war" metaphor pushes us into a reactive, tool-obsessed mindset. It encourages the belief that we can win by buying the next "cyber weapon" or silver-bullet technology. This diverts focus and budget from the foundational (and less glamorous) work of, say, managing software vulnerabilities, managing inventories, or governing identity and access.


  • A Sharper Analogy: Instead of a single "war," what if we thought in terms of a "defensive cyber campaign"? This captures the incessant, attritional nature of the threat. The decades-long strategic positioning of the Cold War is a far better model than a short, decisive battle.


2. The Castle and Moat


  • Why It Works: As a starting point, this analogy is simple and intuitive. It introduces the core concepts of a defensible perimeter, multiple layers of defense, and protected inner sanctums.


  • Where It Breaks Down: This model is dangerously obsolete. It fosters a false sense of security, encouraging an "us vs. them" mindset that over-invests in the perimeter while leaving the internal network vulnerable. Today's threats don't knock at the front gate; they arrive via social engineering, compromised credentials, and vulnerable supply chains. The castle can't defend against a threat that's already inside.


  • A Sharper Analogy: If we must use this, we need to evolve it into a "zero-trust city." This model includes not just walls, but internal guards, checkpoints between districts (network segmentation), required identification for every building (MFA), and roaming patrols (threat hunting).


3. Cyber Hygiene


  • Why It Works: This is a powerful metaphor for conveying that security is a relentless, disciplined set of routine practices, not a one-time fix. Like personal health, it requires consistent effort. It perfectly captures the need for continuous maintenance.


  • Where It Breaks Down: The danger of "hygiene" is that it can be used to place the burden of security solely on individual users, leading to a culture of blame. A sophisticated, systemic failure isn't the result of one person's "poor hygiene." Oversimplifying security into a list of user responsibilities distracts from the need to build a robust architecture that protects users even when they inevitably make mistakes.


  • A Sharper Analogy: Frame it as "Organizational Hygiene" or "System Health." This rightly keeps the focus on the collective responsibility to maintain the entire ecosystem, not just on individual user actions.


4. The Digital Immune System


  • Why It Works: I admit this is a personal favorite. It perfectly explains the goal of our collective defense: to build a system that can detect a new threat (a pathogen) in one place and instantly promulgate defenses (antibodies) across the entire ecosystem. It captures the need to outpace our attackers and disrupt their economics. It even accounts for problems like false positives ("autoimmune reactions").


  • Where It Breaks Down: A biological immune system works unconsciously. Relying on this metaphor can foster a passive, "set it and forget it" approach, leading people to believe their security tools will handle everything automatically. This dangerously underestimates the critical need for active, human-led efforts like threat hunting, intelligence analysis, and strategic response. Today's level of technology is not yet a true immune system.


  • A Sharper Analogy: Use this metaphor to describe our collective goal, not the current reality. It's the North Star we're aiming for—an adaptive, self-healing ecosystem—but we can't pretend we've already arrived.


Bottom Line: Choose Your Words, Choose Your Strategy. We can't escape metaphors. They are essential tools for translating abstract technical concepts into something a board member or a new employee can understand. The goal isn't to stop using them, but to wield them with intention. The wrong metaphor leads to the wrong investments and a false sense of security. The right metaphor aligns the entire organization on a shared understanding of the problem and a clear vision for the solution. So, take a look at your own security program. What story are you telling? Is it a story of battles and weapons, or one of health and resilience?

Recent Posts

See All
Good CISO / Bad CISO

In a first for this blog here is a post I worked on with Mike Aiello , a former colleague from Goldman Sachs and Google and someone, like...

 
 
Subscribe for updates.

Thanks for submitting!

© 2020 Philip Venables. 

bottom of page