Abstract
Securing the cyberspace is a newer domain for national security with threats against intelligence and military targets increasing yearly. There exists, however, a serious challenge to homeland security and the United States’ competitiveness in a new cyber world in which biological information is becoming intellectual property that is a risk for theft and ransom. Cyberbiosecurity is the emerging answer to the biobased cybersecurity vulnerabilities that exist within the United States and that have long-term impacts on the overall bioeconomy which is responsible for 25 % of the United States GDP. The field is beginning to emerge with important meetings, public discussion, testimony to Congress, and publications making importance stances, there does not exist a current systematized structure which can address the needs of the novel cyberbiosecurity space. Cyberbiosecurity needs to be the on-going focus of the government and private companies as a hybridized disciple which is the interface of cybersecurity, cyber-physical security, and biosecurity.
References
Adam, L., M. Kozar, G. Letort, O. Mirat, A. Srivasta, T. Stewart, et al.. 2011. “Strengths and Limitations of the Federal Guidance on Synthetic, DNA.” Nature Biotechnology 29: 208–10. https://doi.org/10.1038/nbt.1802.Suche in Google Scholar
American Hospital Association. 2014. FBI Cyber Division Bulletin: Health Care Systems and Medical Devices at Risk for Increased Cyber Intrusions for Financial Gain. http://www.aha.org/content/14/140408--fbipin-healthsyscyberintrud.pdf (accessed November 25, 2017).Suche in Google Scholar
Boose, Shelley. 2016. “Tripwire RSA Survey: Only 38 Percent of Security Professionals Confident in Ransomware Recovery.” Tripwire. http://www.businesswire.com/news/home/20160324005065/en/Tripwire-RSA-Survey-38-Percent-Security-Professionals.Suche in Google Scholar
Burby, R. 2006. “Hurricane Katrina and the Paradoxes of Government Disaster Policy: Bringing about Wise Governmental Decisions for Hazardous Areas.” The Annals of the American Academy of Political and Social Science 604: 171–91. https://doi.org/10.1177/0002716205284676.Suche in Google Scholar
CDC. 2018. Consumer Genetic Testing Is Booming: But What are the Benefits and Harms to Individuals and Populations?Blogs. CDC. https://blogs.cdc.gov/genomics/2018/06/12/consumer-genetic-testing/.Suche in Google Scholar
Collier, K. 2017. Merck IT Systems Still Crippled in Petya’s Aftermath. Cyberscoop. https://cyberscoop.com/merck-petya-ransomware-ukraine/.Suche in Google Scholar
Computer Fraud & Security. (2016). “Employees Prone to Phishing.” Computer Fraud & Security 2016, 1.10.1016/S1361-3723(16)30004-5Suche in Google Scholar
FBI Warns of “Imminent” Ransomware Attacks on Hospital Systems. 2020. Www.cbsnews.com 29.Suche in Google Scholar
Filkins, B. L., J. Y. Kim, B. Roberts, W. Armstrong, M. A. Miller, M. L. Hultner Castillo, et al.. 2016. “Privacy and Security in the Era of Digital Health: What Should Translational Researchers Know and Do about It?” American Journal of Translational Research 8 (3): 1560–80.Suche in Google Scholar
Frazar, S. L., G. E. Hund, G. T. Bonheyo, J. Diggans, R. A. Bartholomew, L. Gehrig, et al.. 2017. “Defining the Synthetic Biology Supply Chain.” Health Security 15 (4): 392–400, https://doi.org/10.1089/hs.2016.0083.Suche in Google Scholar
Greenberg, A. 2017. “Biohackers Encoded Malware in a Strand of DNA.” Wired. https://www.wired.com/story/malware-dna-hack/.Suche in Google Scholar
Healy, A., & Malhotra, N. (2009). Myopic Voters and Natural Disaster Policy. American Political Science Review, 103 (3). https://doi.org/10.1017/S0003055409990104 Suche in Google Scholar
Houser, Ryan Scott. 2022. “A Collaborative Model for Equitable Response and Recovery in Emergency Management.” Journal of Emergency Management and Disaster Communications 3 (2): 1–25, https://doi.org/10.1142/s2689980922500014.Suche in Google Scholar
“Multi-State Information Sharing and Analysis Center | CISA.” Cybersecurity and Infrastructure Security Agency CISA. https://www.cisa.gov/resources-tools/services/multi-state-information-sharing-and-analysis-center. 2025.Suche in Google Scholar
Murch, R. S., W. K. So, W. G. Buchholz, S. Raman, and J. Peccoud. 2018. “Cyberbiosecurity: An Emerging New Discipline to Help Safeguard the Bioeconomy.” Frontiers in Bioengineering and Biotechnology 6. https://doi.org/10.3389/fbioe.2018.00039.Suche in Google Scholar
Paul, Kari, and Beckett Lois. 2020. “What We Know – and Still Don’t – about the Worst-Ever US Government Cyber-Attack.” The Guardian.Suche in Google Scholar
Pauwels, E., and A. Vidyarthi. 2017. “Who Will Own the Secrets in Our Genes? A U.S.-China Race in Artificial Intelligence and Genomics.” In Center W. W., edited by W. Briefs, 5–9. Washington, DC: Woodrow Wilson Center for International Scholars.Suche in Google Scholar
Peccoud, J., J. E. Gallegos, R. Murch, W. G. Buchholz, and S. Raman. 2017. “Cyberbiosecurity: From Naive Trust to Risk Awareness.” Trends in Biotechnology 36: 4–7. https://doi.org/10.1016/j.tibtech.2017.10.012.Suche in Google Scholar
Ponemon Institute. 2016. Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data. https://www.ponemon.org/local/upload/file/Sixth%20Annual%20Patient%20Privacy%20%26%20Data%20Security%20Report%20FINAL%206.pdf.Suche in Google Scholar
R-NC-5, Virginia. “H.R.1313 - 115th Congress (2017-2018): Preserving Employee Wellness Programs Act.” Congress.gov, 2017. https://www.congress.gov/bill/115th-congress/house-bill/1313.Suche in Google Scholar
Shaban, H., and E. Nakashima. 2017. “Pharmaceutical Giant Rocked by Ransomware Attack.” The Washington Post. https://www.washingtonpost.com/news/the-switch/wp/2017/06/27/pharmaceutical-giant-rocked-by-ransomware-attack/?chead=true&.Suche in Google Scholar
Spence, N., N. Bhardwaj, P. Paul III, and A. Coustasse. 2018. Ransomware in Healthcare Facilities: A Harbinger of the Future?. Perspectives in health information management / AHIMA, American Health Information Management Association, 1–22. http://perspectives.ahima.org/wp-content/uploads/2018/06/RansomwareinHealthcare.pdf.Suche in Google Scholar
Yao, W., C. H. Chu, and Z. Li. 2010. “The Use of RFID in Healthcare: Benefits and Barriers.” In Proceedings of the 2010 IEEE International Conference on RFID Technology and Applications (RFID-TA 2010), 128–34.10.1109/RFID-TA.2010.5529874Suche in Google Scholar
You, E. H. 2017. Safeguarding the Bioeconomy: U.S. Opportunities and Challenges. Washington: Testimony for the U.S. – China Economic and Security Review Commission.Suche in Google Scholar
© 2025 Walter de Gruyter GmbH, Berlin/Boston