Detect, respond, recover
More interesting is the adaptive immune system. Once a virus enters our bodies it causes local inflammation which is the first warning sign that something is wrong. This in turn acts as a trigger for the production of white blood cells which then go on to produce antibodies that bind with pathogens and killer T cells which destroy the virus. Once these lymphocytes have done their job the body is able to recover.
The five steps in this process are exactly analogous to the five steps required in a cyber incident response plan: deter, delay, detect, respond and recover (See View #23). The innate immune system like skin and tonsils correspond to the cyber security policies and the firewall. The adaptive immune system covers the other three steps which in the cyber world are executed through system monitoring and the security operations centre (SOC). Large organisations may have more than one SOC, smaller companies tend to outsource this function to third parties.