Startseite Cyberbiosecurity: An Emerging Answer to Bio-Based Cybersecurity Vulnerabilities
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

Cyberbiosecurity: An Emerging Answer to Bio-Based Cybersecurity Vulnerabilities

  • Ryan Scott Houser ORCID logo EMAIL logo
Veröffentlicht/Copyright: 11. November 2025

Abstract

Securing the cyberspace is a newer domain for national security with threats against intelligence and military targets increasing yearly. There exists, however, a serious challenge to homeland security and the United States’ competitiveness in a new cyber world in which biological information is becoming intellectual property that is a risk for theft and ransom. Cyberbiosecurity is the emerging answer to the biobased cybersecurity vulnerabilities that exist within the United States and that have long-term impacts on the overall bioeconomy which is responsible for 25 % of the United States GDP. The field is beginning to emerge with important meetings, public discussion, testimony to Congress, and publications making importance stances, there does not exist a current systematized structure which can address the needs of the novel cyberbiosecurity space. Cyberbiosecurity needs to be the on-going focus of the government and private companies as a hybridized disciple which is the interface of cybersecurity, cyber-physical security, and biosecurity.


Corresponding author: Ryan Scott Houser, George Mason University Schar School of Policy and Government - Biodefense Program, Arlington, VA, USA, E-mail:

References

Adam, L., M. Kozar, G. Letort, O. Mirat, A. Srivasta, T. Stewart, et al.. 2011. “Strengths and Limitations of the Federal Guidance on Synthetic, DNA.” Nature Biotechnology 29: 208–10. https://doi.org/10.1038/nbt.1802.Suche in Google Scholar

American Hospital Association. 2014. FBI Cyber Division Bulletin: Health Care Systems and Medical Devices at Risk for Increased Cyber Intrusions for Financial Gain. http://www.aha.org/content/14/140408--fbipin-healthsyscyberintrud.pdf (accessed November 25, 2017).Suche in Google Scholar

Boose, Shelley. 2016. “Tripwire RSA Survey: Only 38 Percent of Security Professionals Confident in Ransomware Recovery.” Tripwire. http://www.businesswire.com/news/home/20160324005065/en/Tripwire-RSA-Survey-38-Percent-Security-Professionals.Suche in Google Scholar

Burby, R. 2006. “Hurricane Katrina and the Paradoxes of Government Disaster Policy: Bringing about Wise Governmental Decisions for Hazardous Areas.” The Annals of the American Academy of Political and Social Science 604: 171–91. https://doi.org/10.1177/0002716205284676.Suche in Google Scholar

CDC. 2018. Consumer Genetic Testing Is Booming: But What are the Benefits and Harms to Individuals and Populations?Blogs. CDC. https://blogs.cdc.gov/genomics/2018/06/12/consumer-genetic-testing/.Suche in Google Scholar

Collier, K. 2017. Merck IT Systems Still Crippled in Petya’s Aftermath. Cyberscoop. https://cyberscoop.com/merck-petya-ransomware-ukraine/.Suche in Google Scholar

Computer Fraud & Security. (2016). “Employees Prone to Phishing.” Computer Fraud & Security 2016, 1.10.1016/S1361-3723(16)30004-5Suche in Google Scholar

FBI Warns of “Imminent” Ransomware Attacks on Hospital Systems. 2020. Www.cbsnews.com 29.Suche in Google Scholar

Filkins, B. L., J. Y. Kim, B. Roberts, W. Armstrong, M. A. Miller, M. L. Hultner Castillo, et al.. 2016. “Privacy and Security in the Era of Digital Health: What Should Translational Researchers Know and Do about It?” American Journal of Translational Research 8 (3): 1560–80.Suche in Google Scholar

Frazar, S. L., G. E. Hund, G. T. Bonheyo, J. Diggans, R. A. Bartholomew, L. Gehrig, et al.. 2017. “Defining the Synthetic Biology Supply Chain.” Health Security 15 (4): 392–400, https://doi.org/10.1089/hs.2016.0083.Suche in Google Scholar

Greenberg, A. 2017. “Biohackers Encoded Malware in a Strand of DNA.” Wired. https://www.wired.com/story/malware-dna-hack/.Suche in Google Scholar

Healy, A., & Malhotra, N. (2009). Myopic Voters and Natural Disaster Policy. American Political Science Review, 103 (3). https://doi.org/10.1017/S0003055409990104 Suche in Google Scholar

Houser, Ryan Scott. 2022. “A Collaborative Model for Equitable Response and Recovery in Emergency Management.” Journal of Emergency Management and Disaster Communications 3 (2): 1–25, https://doi.org/10.1142/s2689980922500014.Suche in Google Scholar

“Multi-State Information Sharing and Analysis Center | CISA.” Cybersecurity and Infrastructure Security Agency CISA. https://www.cisa.gov/resources-tools/services/multi-state-information-sharing-and-analysis-center. 2025.Suche in Google Scholar

Murch, R. S., W. K. So, W. G. Buchholz, S. Raman, and J. Peccoud. 2018. “Cyberbiosecurity: An Emerging New Discipline to Help Safeguard the Bioeconomy.” Frontiers in Bioengineering and Biotechnology 6. https://doi.org/10.3389/fbioe.2018.00039.Suche in Google Scholar

Paul, Kari, and Beckett Lois. 2020. “What We Know – and Still Don’t – about the Worst-Ever US Government Cyber-Attack.” The Guardian.Suche in Google Scholar

Pauwels, E., and A. Vidyarthi. 2017. “Who Will Own the Secrets in Our Genes? A U.S.-China Race in Artificial Intelligence and Genomics.” In Center W. W., edited by W. Briefs, 5–9. Washington, DC: Woodrow Wilson Center for International Scholars.Suche in Google Scholar

Peccoud, J., J. E. Gallegos, R. Murch, W. G. Buchholz, and S. Raman. 2017. “Cyberbiosecurity: From Naive Trust to Risk Awareness.” Trends in Biotechnology 36: 4–7. https://doi.org/10.1016/j.tibtech.2017.10.012.Suche in Google Scholar

Ponemon Institute. 2016. Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data. https://www.ponemon.org/local/upload/file/Sixth%20Annual%20Patient%20Privacy%20%26%20Data%20Security%20Report%20FINAL%206.pdf.Suche in Google Scholar

R-NC-5, Virginia. “H.R.1313 - 115th Congress (2017-2018): Preserving Employee Wellness Programs Act.” Congress.gov, 2017. https://www.congress.gov/bill/115th-congress/house-bill/1313.Suche in Google Scholar

Shaban, H., and E. Nakashima. 2017. “Pharmaceutical Giant Rocked by Ransomware Attack.” The Washington Post. https://www.washingtonpost.com/news/the-switch/wp/2017/06/27/pharmaceutical-giant-rocked-by-ransomware-attack/?chead=true&.Suche in Google Scholar

Spence, N., N. Bhardwaj, P. Paul III, and A. Coustasse. 2018. Ransomware in Healthcare Facilities: A Harbinger of the Future?. Perspectives in health information management / AHIMA, American Health Information Management Association, 1–22. http://perspectives.ahima.org/wp-content/uploads/2018/06/RansomwareinHealthcare.pdf.Suche in Google Scholar

Yao, W., C. H. Chu, and Z. Li. 2010. “The Use of RFID in Healthcare: Benefits and Barriers.” In Proceedings of the 2010 IEEE International Conference on RFID Technology and Applications (RFID-TA 2010), 128–34.10.1109/RFID-TA.2010.5529874Suche in Google Scholar

You, E. H. 2017. Safeguarding the Bioeconomy: U.S. Opportunities and Challenges. Washington: Testimony for the U.S. – China Economic and Security Review Commission.Suche in Google Scholar

Received: 2024-08-31
Accepted: 2025-09-22
Published Online: 2025-11-11

© 2025 Walter de Gruyter GmbH, Berlin/Boston

Heruntergeladen am 23.11.2025 von https://www.degruyterbrill.com/document/doi/10.1515/jhsem-2024-0057/html
Button zum nach oben scrollen