Modeling cybersecurity after the human body