Home Cyberbiosecurity: An Emerging Answer to Bio-Based Cybersecurity Vulnerabilities
Article
Licensed
Unlicensed Requires Authentication

Cyberbiosecurity: An Emerging Answer to Bio-Based Cybersecurity Vulnerabilities

  • Ryan Scott Houser ORCID logo EMAIL logo
Published/Copyright: November 11, 2025

Abstract

Securing the cyberspace is a newer domain for national security with threats against intelligence and military targets increasing yearly. There exists, however, a serious challenge to homeland security and the United States’ competitiveness in a new cyber world in which biological information is becoming intellectual property that is a risk for theft and ransom. Cyberbiosecurity is the emerging answer to the biobased cybersecurity vulnerabilities that exist within the United States and that have long-term impacts on the overall bioeconomy which is responsible for 25 % of the United States GDP. The field is beginning to emerge with important meetings, public discussion, testimony to Congress, and publications making importance stances, there does not exist a current systematized structure which can address the needs of the novel cyberbiosecurity space. Cyberbiosecurity needs to be the on-going focus of the government and private companies as a hybridized disciple which is the interface of cybersecurity, cyber-physical security, and biosecurity.


Corresponding author: Ryan Scott Houser, George Mason University Schar School of Policy and Government - Biodefense Program, Arlington, VA, USA, E-mail:

References

Adam, L., M. Kozar, G. Letort, O. Mirat, A. Srivasta, T. Stewart, et al.. 2011. “Strengths and Limitations of the Federal Guidance on Synthetic, DNA.” Nature Biotechnology 29: 208–10. https://doi.org/10.1038/nbt.1802.Search in Google Scholar

American Hospital Association. 2014. FBI Cyber Division Bulletin: Health Care Systems and Medical Devices at Risk for Increased Cyber Intrusions for Financial Gain. http://www.aha.org/content/14/140408--fbipin-healthsyscyberintrud.pdf (accessed November 25, 2017).Search in Google Scholar

Boose, Shelley. 2016. “Tripwire RSA Survey: Only 38 Percent of Security Professionals Confident in Ransomware Recovery.” Tripwire. http://www.businesswire.com/news/home/20160324005065/en/Tripwire-RSA-Survey-38-Percent-Security-Professionals.Search in Google Scholar

Burby, R. 2006. “Hurricane Katrina and the Paradoxes of Government Disaster Policy: Bringing about Wise Governmental Decisions for Hazardous Areas.” The Annals of the American Academy of Political and Social Science 604: 171–91. https://doi.org/10.1177/0002716205284676.Search in Google Scholar

CDC. 2018. Consumer Genetic Testing Is Booming: But What are the Benefits and Harms to Individuals and Populations?Blogs. CDC. https://blogs.cdc.gov/genomics/2018/06/12/consumer-genetic-testing/.Search in Google Scholar

Collier, K. 2017. Merck IT Systems Still Crippled in Petya’s Aftermath. Cyberscoop. https://cyberscoop.com/merck-petya-ransomware-ukraine/.Search in Google Scholar

Computer Fraud & Security. (2016). “Employees Prone to Phishing.” Computer Fraud & Security 2016, 1.10.1016/S1361-3723(16)30004-5Search in Google Scholar

FBI Warns of “Imminent” Ransomware Attacks on Hospital Systems. 2020. Www.cbsnews.com 29.Search in Google Scholar

Filkins, B. L., J. Y. Kim, B. Roberts, W. Armstrong, M. A. Miller, M. L. Hultner Castillo, et al.. 2016. “Privacy and Security in the Era of Digital Health: What Should Translational Researchers Know and Do about It?” American Journal of Translational Research 8 (3): 1560–80.Search in Google Scholar

Frazar, S. L., G. E. Hund, G. T. Bonheyo, J. Diggans, R. A. Bartholomew, L. Gehrig, et al.. 2017. “Defining the Synthetic Biology Supply Chain.” Health Security 15 (4): 392–400, https://doi.org/10.1089/hs.2016.0083.Search in Google Scholar

Greenberg, A. 2017. “Biohackers Encoded Malware in a Strand of DNA.” Wired. https://www.wired.com/story/malware-dna-hack/.Search in Google Scholar

Healy, A., & Malhotra, N. (2009). Myopic Voters and Natural Disaster Policy. American Political Science Review, 103 (3). https://doi.org/10.1017/S0003055409990104 Search in Google Scholar

Houser, Ryan Scott. 2022. “A Collaborative Model for Equitable Response and Recovery in Emergency Management.” Journal of Emergency Management and Disaster Communications 3 (2): 1–25, https://doi.org/10.1142/s2689980922500014.Search in Google Scholar

“Multi-State Information Sharing and Analysis Center | CISA.” Cybersecurity and Infrastructure Security Agency CISA. https://www.cisa.gov/resources-tools/services/multi-state-information-sharing-and-analysis-center. 2025.Search in Google Scholar

Murch, R. S., W. K. So, W. G. Buchholz, S. Raman, and J. Peccoud. 2018. “Cyberbiosecurity: An Emerging New Discipline to Help Safeguard the Bioeconomy.” Frontiers in Bioengineering and Biotechnology 6. https://doi.org/10.3389/fbioe.2018.00039.Search in Google Scholar

Paul, Kari, and Beckett Lois. 2020. “What We Know – and Still Don’t – about the Worst-Ever US Government Cyber-Attack.” The Guardian.Search in Google Scholar

Pauwels, E., and A. Vidyarthi. 2017. “Who Will Own the Secrets in Our Genes? A U.S.-China Race in Artificial Intelligence and Genomics.” In Center W. W., edited by W. Briefs, 5–9. Washington, DC: Woodrow Wilson Center for International Scholars.Search in Google Scholar

Peccoud, J., J. E. Gallegos, R. Murch, W. G. Buchholz, and S. Raman. 2017. “Cyberbiosecurity: From Naive Trust to Risk Awareness.” Trends in Biotechnology 36: 4–7. https://doi.org/10.1016/j.tibtech.2017.10.012.Search in Google Scholar

Ponemon Institute. 2016. Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data. https://www.ponemon.org/local/upload/file/Sixth%20Annual%20Patient%20Privacy%20%26%20Data%20Security%20Report%20FINAL%206.pdf.Search in Google Scholar

R-NC-5, Virginia. “H.R.1313 - 115th Congress (2017-2018): Preserving Employee Wellness Programs Act.” Congress.gov, 2017. https://www.congress.gov/bill/115th-congress/house-bill/1313.Search in Google Scholar

Shaban, H., and E. Nakashima. 2017. “Pharmaceutical Giant Rocked by Ransomware Attack.” The Washington Post. https://www.washingtonpost.com/news/the-switch/wp/2017/06/27/pharmaceutical-giant-rocked-by-ransomware-attack/?chead=true&.Search in Google Scholar

Spence, N., N. Bhardwaj, P. Paul III, and A. Coustasse. 2018. Ransomware in Healthcare Facilities: A Harbinger of the Future?. Perspectives in health information management / AHIMA, American Health Information Management Association, 1–22. http://perspectives.ahima.org/wp-content/uploads/2018/06/RansomwareinHealthcare.pdf.Search in Google Scholar

Yao, W., C. H. Chu, and Z. Li. 2010. “The Use of RFID in Healthcare: Benefits and Barriers.” In Proceedings of the 2010 IEEE International Conference on RFID Technology and Applications (RFID-TA 2010), 128–34.10.1109/RFID-TA.2010.5529874Search in Google Scholar

You, E. H. 2017. Safeguarding the Bioeconomy: U.S. Opportunities and Challenges. Washington: Testimony for the U.S. – China Economic and Security Review Commission.Search in Google Scholar

Received: 2024-08-31
Accepted: 2025-09-22
Published Online: 2025-11-11

© 2025 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 23.11.2025 from https://www.degruyterbrill.com/document/doi/10.1515/jhsem-2024-0057/html?lang=en
Scroll to top button