<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xml:lang="en" dtd-version="1.3" article-type="review-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">GBS</journal-id>
<journal-id journal-id-type="nlm-ta">Global Biosecurity</journal-id>
<journal-title-group>
<journal-title>Global Biosecurity</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Global Biosecurity</abbrev-journal-title>
</journal-title-group>
<issn></issn>
<publisher><publisher-name>UNSW</publisher-name></publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">7(1)</article-id>
<title-group>
<article-title>Addressing Cyberbiosecurity Challenges in the Modern Era of Biotechnology and Artificial Intelligence</article-title>
</title-group>
<contrib-group>
<contrib corresp="yes" contrib-type="author"><name name-style="western"><surname>Eitan</surname><given-names>Laith AL</given-names></name><xref rid="aff1" ref-type="aff"><sup>1</sup></xref><xref rid="cor1" ref-type="corresp"><sup>*</sup></xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Jaouni</surname><given-names>Haytham</given-names></name><xref rid="aff1" ref-type="aff"><sup>1</sup></xref></contrib><contrib contrib-type="author"><name name-style="western"><surname>Mihyar</surname><given-names>Ahmad</given-names></name><xref rid="aff1" ref-type="aff"><sup>1</sup></xref></contrib>
<aff id="aff1"><label>1</label><institution content-type="dept">Department of Biotechnology &amp; Genetic Engineering, Faculty of Science and Arts</institution>, <institution>Jordan University of Science and Technology</institution>, <country country="jo">Jordan</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>*</label>Corresponding Author: Prof. Laith AL-Eitan, <email xlink:href="lneitan@just.edu.jo">lneitan@just.edu.jo</email></corresp>
<fn fn-type="con">
<p content-type="fn-title">Authorƒ?(tm)s Contribution</p>
<p>L.A.E conceptualized the study. L.A.E, H.J, and A.M have all contributed to the manuscript's writing, reviewing, and editing. H.J and A.M designed the figures.</p>
</fn>
</author-notes>
<pub-date publication-format="electronic" date-type="pub"><day>21</day><month>01</month><year>2024</year></pub-date>
<volume>7</volume>
<issue>1</issue>
<abstract>
<p>In an era where artificial intelligence and technology have fully integrated and bloomed in biological sciences, the threat of cyberattacks inside the biological field has increased. With increased dependence on bioinformatics, the internet, and outsourcing for data curation and storage, the development of advanced security measures has become mandatory. They safeguard biological data, systems, and procedures against illegal access, modification, or interference. The information collected for the following article was based on the results of previously published articles. These articles were searched via worldwide search engines and databases such as Google Scholar, PubMed, and Google search engines. The search was performed via different keywords, such as ƒ?ocyberbiosecurity,ƒ?? ƒ?obiosecurity,ƒ?? ƒ?oartificial intelligence,ƒ?? and ƒ?obiotechnology.ƒ?? The inclusion criteria ensured that only cybersecurity biosafety and biosecurity-related articles were included in the reference list. To protect biological systems, data, and infrastructure from cyber-attacks, a wide range of techniques, protocols, and technologies must be included in the emerging discipline of cyberbiosecurity. Robust cyberbiosecurity measures have become increasingly necessary as biotechnology has advanced quickly, incorporating digital technologies into many areas of biological research, industry, and healthcare. The lack of infrastructure for cyberbiosecurity worldwide puts the biological and scientific research community at high risk of attack. This could hinder data availability, research validity, and the development of biotechnology, biosecurity, and science. Although cyberbiosecurity is still a new part of biosecurity, its importance must be addressed in this era of increasing technology and internet dependence in biology and medical research. This article aims to shed light on a new aspect of biosecurity from the eye of cybersecurity. The objective of the current article is to pave the way for the development of the cyberbiosecurity field.</p>
</abstract>
<kwd-group kwd-group-type="author"><title>Keywords: </title><kwd>Artificial Intelligence</kwd><kwd>Biosecurity</kwd><kwd>Biotechnology</kwd><kwd>Cyberbiosecurity</kwd></kwd-group>
</article-meta>
</front>
<body>
<sec sec-type="intro">
<title>Introduction</title>
<p>In recent years, biosafety and biosecurity have caught the attention of many researchers and policymakers worldwide [<xref rid="r1" ref-type="bibr">1</xref>]. The term biosecurity summarizes the measurements for protecting biological information and research integrity [<xref rid="r1" ref-type="bibr">1</xref>]. With technology integrated into nearly every aspect of biological and medical research, a technology-based security system is needed. Therefore, cyberbiosecurity has become a non-negligible part of biosecurity. However, implementing such security measures could be difficult due to the lack of infrastructure to maintain and run such a system.</p>
<p>The rising reach and influence of biotechnology on several industries are the reason for the growing significance and applicability of cyberbiosecurity [<xref rid="r2" ref-type="bibr">2</xref>]. The advancements in and integration of technology in biology have increased the urgency of biosecurity development [<xref rid="r1" ref-type="bibr">1</xref>]. The COVID-19 pandemic highlighted that biotechnology is essential in responding to international health emergencies, from developing vaccines to conducting genetic monitoring [<xref rid="r3" ref-type="bibr">3</xref>]. It has also brought attention to the vulnerability of biological data and research platforms to cyberattacks [<xref rid="r3" ref-type="bibr">3</xref>]. Therefore, maintaining the cybersecurity resilience of biological systems is essential for maintaining public health and national security.</p>
<p>This literature review aims to thoroughly understand cyberbiosecurity, including its definition, historical development, present issues, potential future developments, ethical and legal issues, and suggestions for improving resilience. This study aims to synthesize current research and perspectives from several fields, such as cybersecurity, biotechnology, and bioethics. The current review looks forward to raising the awareness of policymakers, researchers, and the public about the critical importance of cybersecurity in protecting the integrity, security, and resilience of biological systems in the digital age. Addressing these objectives hopes to contribute to the ongoing discourse on cyberbiosecurity.</p>
</sec>
<sec sec-type="other1">
<title>Cyberspecies Threats in the Biological Domain</title>
<sec>
<title>Overview of Biological System Cyberthreats</title>
<p>The threats to biological systems, constantly shifting, include a broad spectrum of malicious actions meant to jeopardize the availability, confidentiality, and integrity of biological data processes and infrastructure [<xref rid="r4" ref-type="bibr">4</xref>]. These dangers pose severe concerns to national security, scientific research, and healthcare delivery because they exploit weaknesses in digital technology, human behavior, and organizational practices.</p>
<p>Data breaches, in which unauthorized parties access private information in digital databases, are among the most common cyber threats to biological systems. Such breaches may lead to theft of intellectual property, proprietary research data, or personally identifiable information (PII) [<xref rid="r5" ref-type="bibr">5</xref>], resulting in monetary losses, harm to one's reputation, and legal repercussions.</p>
<p>Another major cyber threat to the biological realm is supply chain hacks, in which hackers breach target firms by taking advantage of flaws in outside suppliers or service providers [<xref rid="r6" ref-type="bibr">6</xref>]. For example, hackers, corporate espionage agents, and others might use compromised software or hardware in laboratories as entry points to steal sensitive research data without authorization or tamper with trial results, ecology supporting biological research and its development [<xref rid="r7" ref-type="bibr">7</xref>] (<bold>Figure 1</bold><bold>)</bold>.</p>
<fig orientation="portrait" fig-type="figure" position="float" id="f1"><label>Figure 1</label><caption><p><bold><sup>Summarize the possible scenarios in which cyberattacks could affect biological research. A)</sup></bold> <sup>A hacker can infiltrate security systems into a general database, such as the Gene Sequence Database (1), and the hacker can obtain access to a specific gene inside the database (2). Once the gene sequence is accessed, the hacker can manipulate it (3) and reupload it back into the database (4).</sup> <bold><sup>B)</sup></bold> <sup>The threat could be addressed in different scenarios if the hacker could not access the database. I) The hacker could infiltrate and disrupt the conditions of controls of an automated system. II) The attacker could also infiltrate the data after the researcher's extraction, thus producing an unknown biological threat. III) The third scenario could include the disruption of bioinformatics tools and data analysis software, leading to the publication of dangerous false information.</sup></p></caption><graphic orientation="portrait" position="float" xlink:href="7(1)-f1"></graphic></fig>
</sec>
<sec>
<title>Examples of Cyber Incidents in Bioinformatics and Biotechnology</title>
<p>Bioinformatics and biotechnology have revealed several high-profile cyber events that highlight the susceptibility of biological systems to cyberattacks and the possible effects on public health, scientific research, and national security. For instance, the 2020 breach of the Bioinformatics Resource Centers (BRCs) of the National Institutes of Health (NIH) jeopardized sensitive genetic material in NIH databases. It exposed the personal information of thousands of researchers [<xref rid="r8" ref-type="bibr">8</xref>]. Similarly, the 2017 WannaCry ransomware attack caused significant financial losses and disruptions to patient care and drug manufacturing at several pharmaceutical companies and healthcare facilities across the globe, including Merck &amp; Co. and the National Health Service (NHS) of the United Kingdom [<xref rid="r9" ref-type="bibr">9</xref>]. Therefore, as threat actors want to use the abundance of genetic data for identity theft, insurance fraud, or targeted advertising, theft of genomic data has become an increasing problem.</p>
</sec>
<sec>
<title>Risks and Consequences of Cyber Attacks in the Biological Sector</title>
<p>Cyberattack losses may result in the loss of confidential research data or intellectual property, which may have a disastrous effect on innovation, competitiveness, and sustainability for biotech firms and research organizations [<xref rid="r10" ref-type="bibr">10</xref>]. In addition to that, interruptions affecting clinical trial data, diagnostic testing platforms, or electronic health records may cause delays in medical treatments, jeopardize patient safety, and make tracking and managing infectious disease outbreaks or bioterrorism threats more challenging [<xref rid="r11" ref-type="bibr">11</xref>]. Furthermore, cyberattacks in the biological sector significantly impact national security, especially concerning military research, biodefense capabilities, and safeguarding vital infrastructure. Threat actors may seriously jeopardize homeland security, military preparedness, and public safety by attempting to obstruct or compromise biomedical research, vaccine development, or biomanufacturing operations [<xref rid="r12" ref-type="bibr">12</xref>]. Thus, setting up counterthreat measures is a necessity.</p>
</sec>
</sec>
<sec sec-type="other2">
<title>Current Cyberbiosecurity Measures</title>
<sec>
<title>Existing Cybersecurity Protocols in Biological Laboratories</title>
<p>Biological labs use a range of cybersecurity procedures and policies to reduce online threats and safeguard infrastructure and private information. These tools provide network traffic monitoring, abnormal behavior detection, and the prevention of illegal access attempts. Furthermore, encryption methods often safeguard data, whether in motion or at rest, guaranteeing that private data are safe even if unauthorized individuals capture it [<xref rid="r13" ref-type="bibr">13</xref>]. Biological labs need clear standards and processes for controlling cybersecurity threats, which is where organizational policies come into play. In that, the cybersecurity posture of laboratory employees is reinforced even more by regular security awareness training and incident response exercises, which provide them with tools to identify possible threats and take appropriate action [<xref rid="r13" ref-type="bibr">13</xref>].</p>
</sec>
<sec>
<title>Institutional and Regulatory Frameworks</title>
<p>Institutional and regulatory frameworks include rules for maintaining research integrity and preserving sensitive data while ensuring that all relevant laws and regulations are followed. For example, in the U.S., organizations that receive government money for research must abide by cybersecurity laws such as the Health Insurance Portability and Accountability Act (HIPAA) [<xref rid="r14" ref-type="bibr">14</xref>] and the government Information Security Modernization Act (FISMA). Similarly, international bodies such as the International Electrotechnical Commission, the IEC [<xref rid="r15" ref-type="bibr">15</xref>], and the Global Organization for Standardization (ISO) [<xref rid="r16" ref-type="bibr">16</xref>] provide internationally accepted standards for cybersecurity management systems, such as ISO/IEC 27001 [<xref rid="r17" ref-type="bibr">17</xref>] and ISO/IEC 27002 [<xref rid="r18" ref-type="bibr">18</xref>].</p>
<p>Moreover, industry-specific rules and standards provide specialized advice for handling cybersecurity threats in biological research facilities. One example is the US Biosafety in Microbiological and Biomedical Laboratories (BMBL) [<xref rid="r19" ref-type="bibr">19</xref>] guidelines. The specific difficulties and factors that come with working with biological agents and materials are covered in these recommendations, along with the need to safeguard laboratory safety and security from physical and virtual dangers.</p>
</sec>
<sec>
<title>Technological safeguards</title>
<p>Effective cyberbiosecurity measures are built on technological safeguards and best practices, providing crucial defenses against cyber threats. These security measures include software and hardware products designed to identify, stop, and lessen security flaws and breaches. To prevent unwanted access to sensitive data and cryptographic keys, hardware-based protections include deploying secure computer equipment, tamper-resistant servers, encrypted storage devices, and hardware security modules (HSMs) [<xref rid="r20" ref-type="bibr">20</xref>].</p>
<p>Various security techniques and technologies are part of software-based safeguards that assist in identifying and thwarting hostile actions, such as malware infections, phishing scams, and efforts at data exfiltration. Examples include antivirus software, intrusion detection/prevention systems (IDS/IPS) [<xref rid="r21" ref-type="bibr">21</xref>], data loss prevention (DLP) solutions, and secure email gateways.</p>
<p>Additionally, data encryption ensures that even if data are intercepted or hacked, they remain unreadable to unauthorized parties, helping to safeguard sensitive information from illegal access. Similarly, with custom-developed software applications and online services, safe coding standards such as input validation, output encoding, and parameterized queries assist in eliminating typical vulnerabilities such as SQL injection and cross-site scripting (XSS) [<xref rid="r22" ref-type="bibr">22</xref>].</p>
</sec>
</sec>
<sec sec-type="other3">
<title>Vulnerabilities in Cyberbiosecurity</title>
<sec>
<title>Identification of Weaknesses in Current Systems</title>
<p>Biological systems remain susceptible to attacks because of the inherent flaws in present systems, even when different cybersecurity solutions are deployed [<xref rid="r4" ref-type="bibr">4</xref>]. Threat actors use these vulnerabilities, which could result from a convergence of technological, human, and organizational factors, to obtain unauthorized access, alter data, or interfere with regular business processes. ƒ?"Today's crucial technological weakness in most cyberbiosecurity systems is using antiquated hardware and software. Many research institutes and biological laboratories use outdated hardware and software that cannot receive security fixes or upgrades from manufacturers [<xref rid="r23" ref-type="bibr">23</xref>]. This makes them vulnerable to hackers, who may quickly exploit and obtain unauthorized access to systems. Moreover, insufficient network segmentation and access safeguards increase the susceptibility of biological systems to cyberattacks. Administrative networks, laboratory management systems, and data from biological research are often linked, which makes it possible for attackers to travel laterally inside the network after gaining initial access [<xref rid="r24" ref-type="bibr">24</xref>] <bold>(Figure 2</bold><bold>)</bold>.</p>

<!-- Warning: Content model for sec does not allow element attrib here
 in unnamed entity at line 88 char 8 of file:///Users/z3275204/AppData/Local/EXTYLES/TMP/RXPin.xml
--> <attrib></attrib>
<fig orientation="portrait" fig-type="figure" position="float" id="f2"><label>Figure 2</label><caption><p><bold><sup>Distribution of Cyber incidents between 2000 and 2023.</sup></bold> <sup>The data show that the source of cyber threats is global and not limited to a specific region [</sup><xref rid="r25" ref-type="bibr"><sup>25</sup></xref><sup>]. As can be seen, most cyber incidents are of non-identified origins. At the same time, China has the second most number of cyber incidents.</sup></p></caption><graphic orientation="portrait" position="float" xlink:href="7(1)-f2"></graphic></fig>
<p>Cyberbiosecurity vulnerabilities are also heavily influenced by human factors, as human mistakes or carelessness may unintentionally expose biological systems to cyberattacks. Typical instances include staff members falling prey to phishing schemes, thus unintentionally exposing private information or disregarding established security guidelines and practices [<xref rid="r26" ref-type="bibr">26</xref>]. Organizational flaws such as insufficient cybersecurity awareness, lack of specialized cybersecurity personnel, and restricted funding for cybersecurity development add to the vulnerabilities of current cyberbiosecurity systems. Without a robust security awareness culture and an unwavering dedication to prioritizing cybersecurity, companies may face difficulties efficiently reducing cyber risks and promptly addressing new threats.</p>
</sec>
<sec>
<title>Case studies illustrating cyberbiosecurity failures</title>
<p>Numerous well-known case studies highlight the possible repercussions of cyberbiosecurity lapses and their practical effects on biological research, medical care, and national security. In the United Kingdom, for example, a breach of the National Health Service (NHS) in 2017 caused extensive disruptions to healthcare services, including missed appointments, postponed procedures, and subpar patient care. Over 80 NHS trusts and 603 primary care practices were impacted by the WannaCry ransomware assault [<xref rid="r27" ref-type="bibr">27</xref>], which used a known vulnerability in outdated Windows computers. This highlights the need for timely software patching and vulnerability management to reduce cyber threats [<xref rid="r28" ref-type="bibr">28</xref>].</p>
<p>Furthermore, there are serious privacy and security hazards for people when genomic data are stolen from research facilities. Unlawful access to genomic data, which can lead to identity theft and genetic discrimination, may undermine people's trust in biomedical research and healthcare services [<xref rid="r29" ref-type="bibr">29</xref>]. In addition, threat actors may attack public health organizations, biomanufacturing companies, or research institutions to steal or alter genetic data, viruses, or vaccine formulations for bioterrorism needs [<xref rid="r30" ref-type="bibr">30</xref>].</p>
</sec>
<sec>
<title>Gaps in Understanding and Mitigating Cyber Threats</title>
<p>Better threat intelligence and information sharing are vital to moving forward and establishing a solid regional and global infrastructure to counter cyber threats. Research institutes, governmental organizations, and stakeholders in the private sector can work together more closely to exchange threat intelligence, best practices, and lessons from cyber incidents [<xref rid="r31" ref-type="bibr">31</xref>]. This will make spotting new threats and vulnerabilities easier and facilitate the development of correct mitigation plans to counter them. Improving cybersecurity knowledge and education by funding cybersecurity education and training initiatives for lab staff, researchers, and administrators may help increase awareness of cyber hazards and advance best practices for thwarting attacks [<xref rid="r32" ref-type="bibr">32</xref>]. This would increase the preparedness of human forces to address threat mitigation.</p>
<p>Current rules and guidelines should be updated and harmonized to reflect new cyber risks in the biological realm [<xref rid="r33" ref-type="bibr">33</xref>]. Unifying a safe protocol and measures for biological and medical institutions such as research labs, pharmaceutical companies, and hospitals would allow for more solid anticipation programs and more accessible updates. Cooperation with international partners is needed to address global cyber threats and foster a cohesive response to new challenges. It is essential to strengthening international cooperation and coordination on cyberbiosecurity issues [<xref rid="r34" ref-type="bibr">34</xref>]. This includes information sharing, capacity building, and cooperative research initiatives [<xref rid="r34" ref-type="bibr">34</xref>]. Developing a cyberbiosecurity council and expertise-sharing platforms between countries would allow for a nearly unified strength in cyber-attack threat reduction worldwide.</p>
</sec>
</sec>
<sec sec-type="other4">
<title>Interconnectedness of Cybers and Biological Security</title>
<sec>
<title>Exploration of the nexus between cybersecurity and biosafety</title>
<p>The interconnection between cybersecurity and biosafety reflects the convergence of digital and biological technology and the necessity for integrated methods to manage rising risks and vulnerabilities [<xref rid="r35" ref-type="bibr">35</xref>]. As biological systems increasingly become more digitalized, networked, and dependent on digital technology [<xref rid="r36" ref-type="bibr">36</xref>], biosafety intersects with cybersecurity. For example, digital infrastructure and networked communication protocols play a significant role in the processing, analyzing, and sharing of biological data via laboratory automation systems [<xref rid="r37" ref-type="bibr">37</xref>], next-generation sequencing platforms, and bioinformatics tools [<xref rid="r38" ref-type="bibr">38</xref>]. However, combining these technologies also introduces new cybersecurity threats, such as the possibility of genetic data being accessed without authorization, manipulation of experimental findings, or interruption of crucial research processes [<xref rid="r39" ref-type="bibr">39</xref>]. Furthermore, the lines between cybersecurity and biosafety are becoming increasingly hazy due to the widespread use of Internet-of-Things (IoT) devices and cloud-based services in biological research [<xref rid="r40" ref-type="bibr">40</xref>]. In addition to enabling real-time data monitoring and remote access to research facilities, IoT devices expand the attack surface for cyberattacks [<xref rid="r41" ref-type="bibr">41</xref>] (<bold>Figure 3</bold><bold>)</bold>.</p>
<fig orientation="portrait" fig-type="figure" position="float" id="fa"><graphic orientation="portrait" position="float" xlink:href="7(1)-fa"></graphic></fig>
<fig orientation="portrait" fig-type="figure" position="float" id="f3"><label>Figure 3</label><caption><p><bold><sup>Market size of the IoT in healthcare.</sup></bold> <sup>This figure illustrates the market size of the IoT in the healthcare sector from 2022ƒ?"2024 and the expected size from 2025ƒ?"2027 [</sup><xref rid="r42" ref-type="bibr"><sup>42</sup></xref><sup>]. The chart shows that the market size has increased by $100 billion between 2022 (about $400 billion) and 2024 (about $500 billion).</sup></p></caption><graphic orientation="portrait" position="float" xlink:href="7(1)-f3"></graphic></fig>
</sec>
<sec>
<title>Mutual Impact of Cyber and Biological Threat</title>
<p>The intricate interactions between digital technology and biological systems and their possible convergence outcomes are reflected in the joint effects of cyber and biological threats. Cyberattacks targeting biological systems, such as ransomware attacks, data breaches, and supply chain intrusions [<xref rid="r43" ref-type="bibr">43</xref>], may significantly impact public health, biosafety, and biosecurity.</p>
<p>For example, stolen or altered genomic data from biobanks or research institutes may jeopardize the privacy and confidentiality of a person's genetic information. This might result in genetic discrimination [<xref rid="r44" ref-type="bibr">44</xref>] or identity theft [<xref rid="r45" ref-type="bibr">45</xref>]. On the other hand, biological risk may also affect cybersecurity because threat actors might use biological vulnerabilities to conduct cyberattacks or disseminate false information. Examples of these threats include bioterrorism and infectious disease epidemics [<xref rid="r46" ref-type="bibr">46</xref>]. For instance, state-sponsored actors or cybercriminal organizations may use public worries and uncertainty about contagious illnesses to conduct malware distribution campaigns to gain an advantage over other countries [<xref rid="r47" ref-type="bibr">47</xref>]. The confluence of biological and cyber risks raises concerns over dual-use research and technology. For example, advances in gene editing technologies, such as CRISPR-Cas9, can potentially improve agricultural yields and ameliorate genetic illnesses [<xref rid="r48" ref-type="bibr">48</xref>]. Nevertheless, they also raise ethical and security concerns about its abuse for bioterrorism or biowarfare [<xref rid="r49" ref-type="bibr">49</xref>].</p>
</sec>
<sec>
<title>Synergies in Developing Integrated Security Measures</title>
<p>Organizations may strengthen their resistance to new threats and vulnerabilities by using the synergies between cybersecurity and biosafety procedures and fostering a security awareness and readiness culture. The following sections discuss aspects that add to local and worldwide preparedness to address cyber attacks [<xref rid="r23" ref-type="bibr">23</xref>, <xref rid="r50" ref-type="bibr">50</xref>].</p>
<list list-type="order" id="L1"><list-item><p>Risk assessment and mitigation, where organizations may assist in choosing which security controls, resilience measures, and incident response capabilities to invest in first by conducting thorough risk assessments that consider biological and cyber risks, vulnerabilities, and repercussions.</p></list-item>
<list-item><p>Secure-by-design principles in which research projects can reduce vulnerabilities and mitigate risks at every stage of the process, from data collection and analysis to distribution and storage, could be implemented by incorporating cybersecurity and biosafety considerations into the design and development of digital and biological systems.</p></list-item>
<list-item><p>Cross-training and collaboration: Offering cybersecurity and biosafety professionals cross-training opportunities and promoting cooperation between research labs, cybersecurity companies, and government agencies can improve information exchange, the sharing of best practices, and coordinated responses to cyberbiosecurity threats.</p></list-item>
<list-item><p>Regulatory harmonization and alignment: Data protection laws, laboratory safety guidelines, export control regulations, and other regulatory frameworks and standards for cybersecurity and biosafety can be harmonized to simplify compliance requirements and foster a unified strategy for risk management across industries and jurisdictions.</p></list-item>
<list-item><p>Public education and outreach: Spreading knowledge about the potential repercussions of cyberbiosecurity threats and the synergies between cybersecurity and biosafety among researchers, policymakers, and the general public can encourage a proactive risk management culture within and outside the scientific community.</p></list-item></list>
<p>By acknowledging the reciprocal effects of biological and cyber threats and capitalizing on the synergies between biosafety and cybersecurity protocols, organizations can fortify themselves against intricate and dynamic security challenges.</p>
</sec>
</sec>
<sec sec-type="other5">
<title>Future Trends and Emerging Challenges</title>
<sec>
<title>Anticipated Evolution of Cyber Threats in the Biological Domain</title>
<p>The growing digitalization and interconnectivity of biological systems and infrastructure is one trend propelling the emergence of cyber risk in the biological realm. The attack surface for cyber threats grows as biotechnology develops and combines with digital technologies, covering various networked platforms, devices, and data repositories.</p>
<p>Another trend is the rise of complex cyber threats, such as nation-state-sponsored cyberespionage operations [<xref rid="r51" ref-type="bibr">51</xref>], ransomware-as-a-service (RaaS) activities [<xref rid="r52" ref-type="bibr">52</xref>], and advanced persistent threats (APTs) [<xref rid="r53" ref-type="bibr">53</xref>]. Because these threats require sophisticated detection and response skills to identify and neutralize successfully, they present severe problems for cybersecurity and biosafety specialists. Cyber-physical assaults, which combine cyber- and physical security concerns, also present new difficulties for enterprises trying to protect themselves from various dangers. For example, attacks on critical infrastructure and Internet of Things (IoT) devices can predominantly affect biomanufacturing facilities [<xref rid="r54" ref-type="bibr">54</xref>] and biological research facilities.</p>
</sec>
<sec>
<title>Foreseen challenges and potential solutions</title>
<p>Critical difficulties when anticipating cyberbiosecurity obstacles include developing new solutions for safeguarding biological systems and data, which require interdisciplinary expert teams to work together and continuously invest in the research and development of advanced cybersecurity technologies. This is necessary to keep up with rapid technological advancements and the emergence of cyber threats. Policymakers and regulators trying to foster a unified strategy for managing cyberbiosecurity risk across sectors and jurisdictions face difficulties harmonizing disparate regulatory frameworks and standards for sharing. Careful consideration of cybersecurity and biosafety and ongoing dialogue and engagement with stakeholders is necessary to balance security imperatives, ethical research practices, and individual privacy rights [<xref rid="r55" ref-type="bibr">55</xref>].</p>
<p>On the other hand, promoting cooperation among stakeholders from various fields, such as academia, business, and government, can help exchange best practices, lessons learned, and threat intelligence, which will help organizations better understand and reduce the risks associated with cyberbiosecurity. Building capacity and developing the workforce: Financial investments in cybersecurity education, training, and professional development programs can contribute to the development of a workforce with the necessary skills to address the intricate problems of cyberbiosecurity and to foster a resilient and security-aware culture within and outside of the scientific community <bold>(Figure 4</bold><bold>)</bold>.</p>
<fig orientation="portrait" fig-type="figure" position="float" id="f4"><label>Figure 4</label><caption><p><bold><sup>Interest in investing in cybersecurity</sup></bold><sup>. Large companies such as Google, Apple, and Meta have invested in cybersecurity [</sup><xref rid="r56" ref-type="bibr"><sup>56</sup></xref><sup>]. The chart shows that the number of deals has increased over the years, which led to the number of millions invested in the development of cybersecurity.</sup></p></caption><graphic orientation="portrait" position="float" xlink:href="7(1)-f4"></graphic></fig>
</sec>
</sec>
<sec sec-type="cases">
<title>Case Studies and Examples</title>
<sec>
<title>Highlighting Successful Cyberbiosecurity Implementation</title>
<p>Genomic research facilities utilize secure computer systems and encryption techniques to prevent unauthorized access to or disclosure of sensitive genetic data. Using homomorphic encryption and trusted execution environments (TEEs), researchers may perform computations on encrypted genomic material without first decoding it [<xref rid="r57" ref-type="bibr">57</xref>]. This promotes cooperative analysis and research while guaranteeing privacy and confidentiality.</p>
<p>The biotechnology and healthcare sectors have formed information-sharing and analysis centers (ISACs) and threat intelligence-sharing partnerships to exchange actionable threat intelligence, best practices, and incident response methodologies</p>
</sec>
<sec>
<title>Examining Cyberbiosecurity Incidents and Lessons Learned</title>
<p>Cyberbiosecurity events and failure analyses offer valuable insights and opportunities to enhance cybersecurity protocols and biological domain resilience. One example is the 2020 breach of the National Institutes of Health (NIH) Bioinformatics Resource Centers (BRCs), which gave unauthorized parties access to sensitive genetic data and private information (PII) stored in NIH databases [<xref rid="r58" ref-type="bibr">58</xref>]. The incident demonstrated the importance of monitoring systems, access controls, and encryption to protect infrastructure and sensitive research data from cyberattacks.</p>
<p>Another example is the 2017 WannaCry ransomware attack [<xref rid="r59" ref-type="bibr">59</xref>], which disrupted operations at several pharmaceutical and healthcare companies worldwide, including Merck &amp; Co. and the UK National Health Service (NHS) [<xref rid="r59" ref-type="bibr">59</xref>]. The attack highlighted the threats posed by ransomware to critical infrastructure and the need for timely software patches, vulnerability management, and incident response strategies to lower cyber risk [<xref rid="r59" ref-type="bibr">59</xref>]. Furthermore, the 2020 SolarWinds Orion platform attack revealed concerns about software supply chain integrity and security in the biological domain [<xref rid="r60" ref-type="bibr">60</xref>]. Businesses must conduct thorough risk assessments, vendor due diligence, and supply chain monitoring to identify and manage vulnerabilities and dependencies in their digital ecosystems.</p>
</sec>
</sec>
<sec sec-type="other6">
<title>Recommendations for Strengthening Cyberbiosecurity</title>
<sec>
<title>Proposed Strategies for Increasing Cyberbiosecurity Measures</title>
<p>Strengthening cyberbiosecurity requires a multidimensional strategy to address new risks and weaknesses, including organizational, technological, and policy approaches. Organizations may improve their cyberbiosecurity defenses against cyberattacks by using several tactics that protect data, infrastructure, and biological systems. To provide a comprehensive understanding of cyberbiosecurity issues, risk assessments should consider both technological vulnerabilities and human aspects, such as insider threats and social engineering assaults. ƒ?"ƒ?"Adopting a defense-in-depth strategy for cybersecurity involves deploying numerous layers of security controls, including network segmentation, access restrictions, encryption, and intrusion detection systems. Organizations may identify and repel cyberattacks more successfully by building various barriers and stacking security controls and protection methods. To improve cybersecurity education and training, increase knowledge of cyber hazards, and promote best practices for reducing attacks, laboratories, researchers, and administrators must invest in cybersecurity education and training programs. ƒ?"ƒ?"To establish incident response capabilities to successfully identify, contain, and quickly recover from cyberattacks, companies must have robust incident response plans and processes. Incident response plans should include roles and duties, escalation processes, communication protocols, and recovery measures to guarantee a coordinated and efficient response to security issues. The exchange of threat intelligence, best practices, and learning from cyber events may be facilitated by forming cooperative relationships with peer institutions, governmental organizations, cybersecurity companies, and industry groups.</p>
</sec>
</sec>
<sec sec-type="conclusions">
<title>Conclusion</title>
<p>In conclusion, cyberbiosecurity is a crucial topic of concern in the digital age since it creates intricate risks and vulnerabilities for biological systems, data, and infrastructure due to the combination of cybersecurity and biotechnology. Organizations, decision-makers, and researchers must understand the connection between biological and cybersecurity and take proactive steps to successfully manage new risks and threats as the field of cyberbiosecurity gains momentum. Increasing funding opportunities and capacity building are crucial for developing cyberbiosecurity worldwide. By improving knowledge and understanding of the significance of cyberbiosecurity, it is possible to increase the ability of biological systems to withstand and counteract cyber dangers. Establishing international cybersecurity councils and strategic partnerships has become necessary as technology and biological research are inseparable.</p>
</sec>
</body>
<back>
<fn-group>
<fn fn-type="conflict">
<p content-type="fn-title">Conflict of interest</p>
<p>All the authors declare that they do not have conflicts of interest.</p>
</fn>
</fn-group>
<ack>
<title>Acknowledgments</title>
<p>The authors thank Jordan University of Science and Technology for providing administrative and technical support.</p>
</ack>
<sec sec-type="data-availability">
<title>Data Availability</title>
<p>Not Applicable.</p>
</sec>
<sec sec-type="data-availability">
<title>Ethics and Consent</title>
<p>Not Applicable.</p>
</sec>
<fn-group>
<fn fn-type="financial-disclosure">
<p content-type="fn-title">Funding</p>
<p>Not applicable.</p>
</fn>
</fn-group>
<ref-list>
<title>References</title>
<ref id="r1"><label>1</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Laith</surname> <given-names>A-E</given-names></string-name>, <string-name name-style="western"><surname>Alnemri</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Biosafety and biosecurity in the era of biotechnology: The Middle East region.</article-title> <source>Journal of Biosafety and Biosecurity.</source> <year>2022</year>;<volume>4</volume>(<issue>2</issue>):<fpage>130</fpage>-<lpage>45</lpage>. <pub-id pub-id-type="doi">10.1016/j.jobb.2022.11.002</pub-id></mixed-citation></ref>
<ref id="r2"><label>2</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Millett</surname> <given-names>K</given-names></string-name>, <string-name name-style="western"><surname>Dos Santos</surname> <given-names>E</given-names></string-name>, <string-name name-style="western"><surname>Millett</surname> <given-names>PD</given-names></string-name></person-group>. <article-title>Cyber-biosecurity risk perceptions in the biotech sector.</article-title> <source>Frontiers in bioengineering and biotechnology.</source> <year>2019</year>;<volume>7</volume>:<fpage>136</fpage>. <pub-id pub-id-type="doi">10.3389/fbioe.2019.00136</pub-id><pub-id pub-id-type="pmid">31275929</pub-id></mixed-citation></ref>
<ref id="r3"><label>3</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Aileni</surname> <given-names>M</given-names></string-name>, <string-name name-style="western"><surname>Rohela</surname> <given-names>GK</given-names></string-name>, <string-name name-style="western"><surname>Jogam</surname> <given-names>P</given-names></string-name>, <string-name name-style="western"><surname>Soujanya</surname> <given-names>S</given-names></string-name>, <string-name name-style="western"><surname>Zhang</surname> <given-names>B</given-names></string-name></person-group>. <article-title>Biotechnological perspectives to combat the COVID-19 pandemic: precise diagnostics and inevitable vaccine paradigms.</article-title> <source>Cells.</source> <year>2022</year>;<volume>11</volume>(<issue>7</issue>):<fpage>1182</fpage>. <pub-id pub-id-type="doi">10.3390/cells11071182</pub-id><pub-id pub-id-type="pmid">35406746</pub-id></mixed-citation></ref>
<ref id="r4"><label>4</label><mixed-citation publication-type="book">Mthunzi SN, Benkhelifa E, Bosakowski T, Hariri S. A bio-inspired approach to cyber security. Machine Learning for Computer and Cyber Security: CRC Press; 2019. p. 75-104.</mixed-citation></ref>
<ref id="r5"><label>5</label><mixed-citation publication-type="web">Hanley M, Dean T, Schroeder W, Houy M, Trzeciak RF, Montelibano J. An analysis of technical observations in insider theft of intellectual property cases2011. Available from: <ext-link xlink:href="http://www.dtic.mil/get-tr-doc/pdf" xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri">http://www.dtic.mil/get-tr-doc/pdf</ext-link></mixed-citation></ref>
<ref id="r6"><label>6</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Sobb</surname> <given-names>T</given-names></string-name>, <string-name name-style="western"><surname>Turnbull</surname> <given-names>B</given-names></string-name>, <string-name name-style="western"><surname>Moustafa</surname> <given-names>N.</given-names></string-name></person-group> <article-title>Supply chain 4.0: A survey of cyber security challenges, solutions and future directions.</article-title> <source>Electronics.</source> <year>2020</year>;<volume>9</volume>(<issue>11</issue>):<fpage>1864</fpage>. <pub-id pub-id-type="doi">10.3390/electronics9111864</pub-id></mixed-citation></ref>
<ref id="r7"><label>7</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Filkins</surname> <given-names>BL</given-names></string-name>, <string-name name-style="western"><surname>Kim</surname> <given-names>JY</given-names></string-name>, <string-name name-style="western"><surname>Roberts</surname> <given-names>B</given-names></string-name>, <string-name name-style="western"><surname>Armstrong</surname> <given-names>W</given-names></string-name>, <string-name name-style="western"><surname>Miller</surname> <given-names>MA</given-names></string-name>, <string-name name-style="western"><surname>Hultner</surname> <given-names>ML</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Privacy and security in the era of digital health: what should translational researchers know and do about it?</article-title> <source>American journal of translational research.</source> <year>2016</year>;<volume>8</volume>(<issue>3</issue>):<fpage>1560</fpage>.<pub-id pub-id-type="pmid">27186282</pub-id></mixed-citation></ref>
<ref id="r8"><label>8</label><mixed-citation publication-type="other">Von Solms R, Van Niekerk J. From information security to cyber security. computers &amp; security. 2013;38:97-102.</mixed-citation></ref>
<ref id="r9"><label>9</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Srinivas</surname> <given-names>J</given-names></string-name>, <string-name name-style="western"><surname>Das</surname> <given-names>AK</given-names></string-name>, <string-name name-style="western"><surname>Kumar</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Government regulations in cyber security: Framework, standards and recommendations.</article-title> <source>Future generation computer systems.</source> <year>2019</year>;<volume>92</volume>:<fpage>178</fpage>-<lpage>88</lpage>. <pub-id pub-id-type="doi">10.1016/j.future.2018.09.063</pub-id></mixed-citation></ref>
<ref id="r10"><label>10</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Toch</surname> <given-names>E</given-names></string-name>, <string-name name-style="western"><surname>Bettini</surname> <given-names>C</given-names></string-name>, <string-name name-style="western"><surname>Shmueli</surname> <given-names>E</given-names></string-name>, <string-name name-style="western"><surname>Radaelli</surname> <given-names>L</given-names></string-name>, <string-name name-style="western"><surname>Lanzi</surname> <given-names>A</given-names></string-name>, <string-name name-style="western"><surname>Riboni</surname> <given-names>D</given-names></string-name>, <string-name name-style="western"><surname>Lepri</surname> <given-names>B</given-names></string-name></person-group>. <article-title>The privacy implications of cyber security systems: A technological survey.</article-title> <source>ACM Computing Surveys (CSUR)</source>. <year>2018</year>;<volume>51</volume>(<issue>2</issue>):<fpage>1</fpage>-<lpage>27</lpage>. <pub-id pub-id-type="doi">10.1145/3172869</pub-id></mixed-citation></ref>
<ref id="r11"><label>11</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Seemma</surname> <given-names>P</given-names></string-name>, <string-name name-style="western"><surname>Nandhini</surname> <given-names>S</given-names></string-name>, <string-name name-style="western"><surname>Sowmiya</surname> <given-names>M</given-names></string-name></person-group>. <article-title>Overview of cyber security.</article-title> <source>International Journal of Advanced Research in Computer and Communication Engineering.</source> <year>2018</year>;<volume>7</volume>(<issue>11</issue>):<fpage>125</fpage>-<lpage>8</lpage>. <pub-id pub-id-type="doi">10.17148/IJARCCE.2018.71127</pub-id></mixed-citation></ref>
<ref id="r12"><label>12</label><mixed-citation publication-type="book">Agbaje M, Awodele O, Ogbonna C, editors. Applications of digital watermarking to cyber security (cyber watermarking). Proceedings of Informing Science &amp; IT Education Conference (InSITE); 2015.</mixed-citation></ref>
<ref id="r13"><label>13</label><mixed-citation publication-type="book">Khari M, Shrivastava G, Gupta S, Gupta R. Role of cyber security in today's scenario. Detecting and mitigating robotic cyber security risks: IGI Global; 2017. p. 177-91.</mixed-citation></ref>
<ref id="r14"><label>14</label><mixed-citation publication-type="book">Bonfanti ME. Artificial intelligence and the offence-defence balance in cyber security. Cyber Security: Socio-Technological Uncertainty and Political Fragmentation London: Routledge. 2022:64-79.</mixed-citation></ref>
<ref id="r15"><label>15</label><mixed-citation publication-type="other">Sharma P. A Detailed Review on Cyber Security 2022 [Available from: <pub-id pub-id-type="doi">10.36893/JNAO.2022.V13I02.012-020</pub-id>.<pub-id pub-id-type="doi">10.36893/JNAO.2022.V13I02.012-020</pub-id></mixed-citation></ref>
<ref id="r16"><label>16</label><mixed-citation publication-type="web">ISO. International Organization for Standardization 2024 [Available from: <ext-link xlink:href="https://www.iso.org/home.html" xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri">https://www.iso.org/home.html</ext-link>.</mixed-citation></ref>
<ref id="r17"><label>17</label><mixed-citation publication-type="web">ISO. Information security, cybersecurity and privacy protection ƒ?" Information security management systems ƒ?" Requirements, ISO/IEC 27001:2022 2022 [Available from: <ext-link xlink:href="https://www.iso.org/standard/27001" xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri">https://www.iso.org/standard/27001</ext-link>.</mixed-citation></ref>
<ref id="r18"><label>18</label><mixed-citation publication-type="web">ISO. Information security, cybersecurity and privacy protection ƒ?" Information security controls, ISO/IEC 27002:2022 2022 [Available from: <ext-link xlink:href="https://www.iso.org/standard/75652.html" xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri">https://www.iso.org/standard/75652.html</ext-link>.</mixed-citation></ref>
<ref id="r19"><label>19</label><mixed-citation publication-type="web">Prevention CfDCa. Biosafety in Microbiological and Biomedical Laboratories 2020 [Available from: <ext-link xlink:href="https://www.cdc.gov/labs/pdf/SF__19_308133-A_BMBL6_00-BOOK-WEB-final-3.pdf" xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri">https://www.cdc.gov/labs/pdf/SF__19_308133-A_BMBL6_00-BOOK-WEB-final-3.pdf</ext-link>.</mixed-citation></ref>
<ref id="r20"><label>20</label><mixed-citation publication-type="book">Sommerhalder M. Hardware Security Module. Trends in Data Protection and Encryption Technologies. 2023:83-7.</mixed-citation></ref>
<ref id="r21"><label>21</label><mixed-citation publication-type="confproc">Ashoor AS, Gore S, editors. Difference between intrusion detection system (IDS) and intrusion prevention system (IPS). Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011 4; 2011: Springer.</mixed-citation></ref>
<ref id="r22"><label>22</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Deepa</surname> <given-names>G</given-names></string-name>, <string-name name-style="western"><surname>Thilagam</surname> <given-names>PS</given-names></string-name></person-group>. <article-title>Securing web applications from injection and logic vulnerabilities: Approaches and challenges.</article-title> <source>Information and Software Technology.</source> <year>2016</year>;<volume>74</volume>:<fpage>160</fpage>-<lpage>80</lpage>. <pub-id pub-id-type="doi">10.1016/j.infsof.2016.02.005</pub-id></mixed-citation></ref>
<ref id="r23"><label>23</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Reed</surname> <given-names>JC</given-names></string-name>, <string-name name-style="western"><surname>Dunaway</surname> <given-names>N</given-names></string-name></person-group>. <article-title>Cyberbiosecurity Implications for the Laboratory of the Future.</article-title> <source>Frontiers in bioengineering and biotechnology.</source> <year>2019</year>;<volume>7</volume>:<fpage>182</fpage>. <pub-id pub-id-type="doi">10.3389/fbioe.2019.00182</pub-id><pub-id pub-id-type="pmid">31497596</pub-id></mixed-citation></ref>
<ref id="r24"><label>24</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Usama</surname> <given-names>M</given-names></string-name>, <string-name name-style="western"><surname>Qadir</surname> <given-names>J</given-names></string-name>, <string-name name-style="western"><surname>Raza</surname> <given-names>A</given-names></string-name>, <string-name name-style="western"><surname>Arif</surname> <given-names>H</given-names></string-name>, <string-name name-style="western"><surname>Yau</surname> <given-names>K-LA</given-names></string-name>, <string-name name-style="western"><surname>Elkhatib</surname> <given-names>Y</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Unsupervised machine learning for networking: Techniques, applications and research challenges.</article-title> <source>IEEE access.</source> <year>2019</year>;<volume>7</volume>:<fpage>65579</fpage>-<lpage>615</lpage>. <pub-id pub-id-type="doi">10.1109/ACCESS.2019.2916648</pub-id></mixed-citation></ref>
<ref id="r25"><label>25</label><mixed-citation publication-type="web">Incidents ERoC. Overview of cyber incidents 2024 [Available from: <ext-link xlink:href="https://eurepoc.eu/" xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri">https://eurepoc.eu/</ext-link>.</mixed-citation></ref>
<ref id="r26"><label>26</label><mixed-citation publication-type="book">Neumann PG. Combatting insider threats. Insider Threats in Cyber Security: Springer; 2010. p. 17-44.</mixed-citation></ref>
<ref id="r27"><label>27</label><mixed-citation publication-type="book">Collier R. NHS ransomware attack spreads worldwide. Can Med Assoc; 2017.</mixed-citation></ref>
<ref id="r28"><label>28</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Ghafur</surname> <given-names>S</given-names></string-name>, <string-name name-style="western"><surname>Kristensen</surname> <given-names>S</given-names></string-name>, <string-name name-style="western"><surname>Honeyford</surname> <given-names>K</given-names></string-name>, <string-name name-style="western"><surname>Martin</surname> <given-names>G</given-names></string-name>, <string-name name-style="western"><surname>Darzi</surname> <given-names>A</given-names></string-name>, <string-name name-style="western"><surname>Aylin</surname> <given-names>P.</given-names></string-name></person-group> <article-title>A retrospective impact analysis of the WannaCry cyberattack on the NHS.</article-title> <source>NPJ digital medicine.</source> <year>2019</year>;<volume>2</volume>(<issue>1</issue>):<fpage>98</fpage>. <pub-id pub-id-type="doi">10.1038/s41746-019-0161-6</pub-id><pub-id pub-id-type="pmid">31602404</pub-id></mixed-citation></ref>
<ref id="r29"><label>29</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Oliver</surname> <given-names>JM</given-names></string-name>, <string-name name-style="western"><surname>Slashinski</surname> <given-names>M</given-names></string-name>, <string-name name-style="western"><surname>Wang</surname> <given-names>T</given-names></string-name>, <string-name name-style="western"><surname>Kelly</surname> <given-names>P</given-names></string-name>, <string-name name-style="western"><surname>Hilsenbeck</surname> <given-names>S</given-names></string-name>, <string-name name-style="western"><surname>McGuire</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Balancing the risks and benefits of genomic data sharing: genome research participantsƒ?(tm) perspectives.</article-title> <source>Public health genomics.</source> <year>2012</year>;<volume>15</volume>(<issue>2</issue>):<fpage>106</fpage>-<lpage>14</lpage>. <pub-id pub-id-type="doi">10.1159/000334718</pub-id><pub-id pub-id-type="pmid">22213783</pub-id></mixed-citation></ref>
<ref id="r30"><label>30</label><mixed-citation publication-type="web">Prevention CfDCa. Bioterrorism and Anthrax: The Threat 2024 [Available from: <ext-link xlink:href="https://www.cdc.gov/anthrax/bioterrorism/index.html" xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri">https://www.cdc.gov/anthrax/bioterrorism/index.html</ext-link>.</mixed-citation></ref>
<ref id="r31"><label>31</label><mixed-citation publication-type="confproc">Berndt A, Ophoff J, editors. Exploring the value of a cyber threat intelligence function in an organization. Information Security Education Information Security in Action: 13th IFIP WG 118 World Conference, WISE 13, Maribor, Slovenia, September 21ƒ?"23, 2020, Proceedings 13; 2020: Springer.</mixed-citation></ref>
<ref id="r32"><label>32</label><mixed-citation publication-type="web">Piromsopa NNaK. How to Increase Cybersecurity Awareness 2019 [Available from: <ext-link xlink:href="https://www.isaca.org/resources/isaca-journal/issues/2019/volume-2/how-to-increase-cybersecurity-awareness#:~:text=There%20are%20various%20methods%20used,%2C%20videos%2C%20simulations%20and%20tests" xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri">https://www.isaca.org/resources/isaca-journal/issues/2019/volume-2/how-to-increase-cybersecurity-awareness#:~:text=There%20are%20various%20methods%20used,%2C%20videos%2C%20simulations%20and%20tests</ext-link>.</mixed-citation></ref>
<ref id="r33"><label>33</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Li</surname> <given-names>Y</given-names></string-name>, <string-name name-style="western"><surname>Liu</surname> <given-names>Q.</given-names></string-name></person-group> <article-title>A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments.</article-title> <source>Energy Reports.</source> <year>2021</year>;<volume>7</volume>:<fpage>8176</fpage>-<lpage>86</lpage>. <pub-id pub-id-type="doi">10.1016/j.egyr.2021.08.126</pub-id></mixed-citation></ref>
<ref id="r34"><label>34</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Rudner</surname> <given-names>M.</given-names></string-name></person-group> <article-title>Cyber-threats to critical national infrastructure: An intelligence challenge.</article-title> <source>International Journal of Intelligence and CounterIntelligence.</source> <year>2013</year>;<volume>26</volume>(<issue>3</issue>):<fpage>453</fpage>-<lpage>81</lpage>. <pub-id pub-id-type="doi">10.1080/08850607.2013.780552</pub-id></mixed-citation></ref>
<ref id="r35"><label>35</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><given-names>Bhushan M.</given-names> <surname>Cyber-biosecurity</surname></string-name></person-group>. <source>J Defense Stud.</source> <year>2023</year>;<volume>17</volume>(<issue>2</issue>):<fpage>93</fpage>-<lpage>119</lpage>.</mixed-citation></ref>
<ref id="r36"><label>36</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Stoumpos</surname> <given-names>AI</given-names></string-name>, <string-name name-style="western"><surname>Kitsios</surname> <given-names>F</given-names></string-name>, <string-name name-style="western"><surname>Talias</surname> <given-names>MA</given-names></string-name></person-group>. <article-title>Digital transformation in healthcare: technology acceptance and its applications.</article-title> <source>International journal of environmental research and public health.</source> <year>2023</year>;<volume>20</volume>(<issue>4</issue>):<fpage>3407</fpage>. <pub-id pub-id-type="doi">10.3390/ijerph20043407</pub-id><pub-id pub-id-type="pmid">36834105</pub-id></mixed-citation></ref>
<ref id="r37"><label>37</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Habich</surname> <given-names>T</given-names></string-name>, <string-name name-style="western"><surname>Beutel</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Digitalization concepts in academic bioprocess development.</article-title> <source>Engineering in Life Sciences.</source> <year>2024</year>:<elocation-id>2300238</elocation-id>. <pub-id pub-id-type="doi">10.1002/elsc.202300238</pub-id><pub-id pub-id-type="pmid">38584688</pub-id></mixed-citation></ref>
<ref id="r38"><label>38</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Torri</surname> <given-names>F</given-names></string-name>, <string-name name-style="western"><surname>Dinov</surname> <given-names>ID</given-names></string-name>, <string-name name-style="western"><surname>Zamanyan</surname> <given-names>A</given-names></string-name>, <string-name name-style="western"><surname>Hobel</surname> <given-names>S</given-names></string-name>, <string-name name-style="western"><surname>Genco</surname> <given-names>A</given-names></string-name>, <string-name name-style="western"><surname>Petrosyan</surname> <given-names>P</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Next generation sequence analysis and computational genomics using graphical pipeline workflows.</article-title> <source>Genes.</source> <year>2012</year>;<volume>3</volume>(<issue>3</issue>):<fpage>545</fpage>-<lpage>75</lpage>. <pub-id pub-id-type="doi">10.3390/genes3030545</pub-id><pub-id pub-id-type="pmid">23139896</pub-id></mixed-citation></ref>
<ref id="r39"><label>39</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Arshad</surname> <given-names>S</given-names></string-name>, <string-name name-style="western"><surname>Arshad</surname> <given-names>J</given-names></string-name>, <string-name name-style="western"><surname>Khan</surname> <given-names>MM</given-names></string-name>, <string-name name-style="western"><surname>Parkinson</surname> <given-names>S</given-names></string-name></person-group>. <article-title>Analysis of security and privacy challenges for DNA-genomics applications and databases.</article-title> <source>Journal of Biomedical Informatics.</source> <year>2021</year>;<volume>119</volume>:<elocation-id>103815</elocation-id>. <pub-id pub-id-type="doi">10.1016/j.jbi.2021.103815</pub-id><pub-id pub-id-type="pmid">34022422</pub-id></mixed-citation></ref>
<ref id="r40"><label>40</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>AlSalem</surname> <given-names>TS</given-names></string-name>, <string-name name-style="western"><surname>Almaiah</surname> <given-names>MA</given-names></string-name>, <string-name name-style="western"><surname>Lutfi</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Cybersecurity Risk Analysis in the IoT: A Systematic Review.</article-title> <source>Electronics.</source> <year>2023</year>;<volume>12</volume>(<issue>18</issue>):<fpage>3958</fpage>. <pub-id pub-id-type="doi">10.3390/electronics12183958</pub-id></mixed-citation></ref>
<ref id="r41"><label>41</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Rao</surname> <given-names>AR</given-names></string-name>, <string-name name-style="western"><surname>Elias-Medina</surname> <given-names>A</given-names></string-name></person-group>. <article-title>Designing an internet of things laboratory to improve student understanding of secure IoT systems.</article-title> <source>Internet of Things and Cyber-Physical Systems.</source> <year>2024</year>;<volume>4</volume>:<fpage>154</fpage>-<lpage>66</lpage>. <pub-id pub-id-type="doi">10.1016/j.iotcps.2023.10.002</pub-id></mixed-citation></ref>
<ref id="r42"><label>42</label><mixed-citation publication-type="web">Healthcare T. IoT in Healthcare Market Share and Trends by 2032 2024 [Available from: <ext-link xlink:href="https://www.towardshealthcare.com/insights/iot-in-healthcare-market-size" xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri">https://www.towardshealthcare.com/insights/iot-in-healthcare-market-size</ext-link>.</mixed-citation></ref>
<ref id="r43"><label>43</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Mantle</surname> <given-names>JL</given-names></string-name>, <string-name name-style="western"><surname>Rammohan</surname> <given-names>J</given-names></string-name>, <string-name name-style="western"><surname>Romantseva</surname> <given-names>EF</given-names></string-name>, <string-name name-style="western"><surname>Welch</surname> <given-names>JT</given-names></string-name>, <string-name name-style="western"><surname>Kauffman</surname> <given-names>LR</given-names></string-name>, <string-name name-style="western"><surname>McCarthy</surname> <given-names>J</given-names></string-name>, <etal>et al.</etal></person-group> <article-title>Cyberbiosecurity for biopharmaceutical products.</article-title> <source>Frontiers in Bioengineering and Biotechnology.</source> <year>2019</year>;<volume>7</volume>:<fpage>116</fpage>. <pub-id pub-id-type="doi">10.3389/fbioe.2019.00116</pub-id><pub-id pub-id-type="pmid">31214582</pub-id></mixed-citation></ref>
<ref id="r44"><label>44</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Gostin</surname> <given-names>L.</given-names></string-name></person-group> <article-title>Genetic discrimination: the use of genetically based diagnostic and prognostic tests by employers and insurers.</article-title> <source>American Journal of Law &amp; Medicine.</source> <year>1991</year>;<volume>17</volume>(<issue>1-2</issue>):<fpage>109</fpage>-<lpage>44</lpage>. <pub-id pub-id-type="doi">10.1017/S0098858800007942</pub-id><pub-id pub-id-type="pmid">1831594</pub-id></mixed-citation></ref>
<ref id="r45"><label>45</label><mixed-citation publication-type="web">Vieraitis LM, Shuraydi A. Identity theft2012. Available from: <ext-link xlink:href="https://academic.oup.com/edited-volume/41333/chapter/352358022" xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri">https://academic.oup.com/edited-volume/41333/chapter/352358022</ext-link>.</mixed-citation></ref>
<ref id="r46"><label>46</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Das</surname> <given-names>S</given-names></string-name>, <string-name name-style="western"><surname>Kataria</surname> <given-names>VK</given-names></string-name></person-group>. <article-title>Bioterrorism: A public health perspective.</article-title> <source>Medical Journal Armed Forces India.</source> <year>2010</year>;<volume>66</volume>(<issue>3</issue>):<fpage>255</fpage>-<lpage>60</lpage>. <pub-id pub-id-type="doi">10.1016/S0377-1237(10)80051-6</pub-id><pub-id pub-id-type="pmid">27408313</pub-id></mixed-citation></ref>
<ref id="r47"><label>47</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Desai</surname> <given-names>AN</given-names></string-name>, <string-name name-style="western"><surname>Ruidera</surname> <given-names>D</given-names></string-name>, <string-name name-style="western"><surname>Steinbrink</surname> <given-names>JM</given-names></string-name>, <string-name name-style="western"><surname>Granwehr</surname> <given-names>B</given-names></string-name>, <string-name name-style="western"><surname>Lee</surname> <given-names>DH</given-names></string-name></person-group>. <article-title>Misinformation and disinformation: the potential disadvantages of social media in infectious disease and how to combat them.</article-title> <source>Clinical Infectious Diseases.</source> <year>2022</year>;<volume>74</volume>(<supplement>Supplement_3</supplement>):<fpage>e34</fpage>-<lpage>e9</lpage>. <pub-id pub-id-type="doi">10.1093/cid/ciac109</pub-id><pub-id pub-id-type="pmid">35568471</pub-id></mixed-citation></ref>
<ref id="r48"><label>48</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Gostimskaya</surname> <given-names>I.</given-names></string-name></person-group> <article-title>CRISPRƒ?"cas9: A history of its discovery and ethical considerations of its use in genome editing.</article-title> <source>Biochemistry (Moscow)</source>. <year>2022</year>;<volume>87</volume>(<issue>8</issue>):<fpage>777</fpage>-<lpage>88</lpage>. <pub-id pub-id-type="doi">10.1134/S0006297922080090</pub-id><pub-id pub-id-type="pmid">36171658</pub-id></mixed-citation></ref>
<ref id="r49"><label>49</label><mixed-citation publication-type="book">Riedel S, editor Biological warfare and bioterrorism: a historical review. Baylor University Medical Center Proceedings; 2004: Taylor &amp; Francis.</mixed-citation></ref>
<ref id="r50"><label>50</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Richardson</surname> <given-names>LC</given-names></string-name>, <string-name name-style="western"><surname>Lewis</surname> <given-names>SM</given-names></string-name>, <string-name name-style="western"><surname>Burnette</surname> <given-names>RN</given-names></string-name></person-group>. <article-title>Building capacity for cyberbiosecurity training.</article-title> <source>Frontiers in Bioengineering and Biotechnology.</source> <year>2019</year>;<volume>7</volume>:<fpage>112</fpage>. <pub-id pub-id-type="doi">10.3389/fbioe.2019.00112</pub-id><pub-id pub-id-type="pmid">31297367</pub-id></mixed-citation></ref>
<ref id="r51"><label>51</label><mixed-citation publication-type="other">Ohlin JD, Govern K, Finkelstein C. Cyber war: law and ethics for virtual conflicts: OUP Oxford; 2015.</mixed-citation></ref>
<ref id="r52"><label>52</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Meland</surname> <given-names>PH</given-names></string-name>, <string-name name-style="western"><surname>Bayoumy</surname> <given-names>YFF</given-names></string-name>, <string-name name-style="western"><surname>Sindre</surname> <given-names>G</given-names></string-name></person-group>. <article-title>The Ransomware-as-a-Service economy within the darknet.</article-title> <source>Computers &amp; Security.</source> <year>2020</year>;<volume>92</volume>:<elocation-id>101762</elocation-id>. <pub-id pub-id-type="doi">10.1016/j.cose.2020.101762</pub-id></mixed-citation></ref>
<ref id="r53"><label>53</label><mixed-citation publication-type="confproc">Chen P, Desmet L, Huygens C, editors. A study on advanced persistent threats. Communications and Multimedia Security: 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014 Proceedings 15; 2014: Springer.</mixed-citation></ref>
<ref id="r54"><label>54</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Borgosz</surname> <given-names>L</given-names></string-name>, <string-name name-style="western"><surname>Dikicioglu</surname> <given-names>D</given-names></string-name></person-group>. <article-title>Industrial internet of things: What does it mean for the bioprocess industries?</article-title> <source>Biochemical Engineering Journal.</source> <year>2024</year>;<volume>201</volume>:<elocation-id>109122</elocation-id>. <pub-id pub-id-type="doi">10.1016/j.bej.2023.109122</pub-id></mixed-citation></ref>
<ref id="r55"><label>55</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Greenbaum</surname> <given-names>D.</given-names></string-name></person-group> <article-title>Cyberbiosecurity: An emerging field that has ethical implications for clinical neuroscience.</article-title> <source>Cambridge Quarterly of Healthcare Ethics.</source> <year>2021</year>;<volume>30</volume>(<issue>4</issue>):<fpage>662</fpage>-<lpage>8</lpage>. <pub-id pub-id-type="doi">10.1017/S096318012100013X</pub-id><pub-id pub-id-type="pmid">34702413</pub-id></mixed-citation></ref>
<ref id="r56"><label>56</label><mixed-citation publication-type="web">Insights C. The Big Tech In Cybersecurity Report: How Facebook, Apple, Microsoft, Google, &amp; Amazon Are Tackling Cyber Threats 2022 [Available from: <ext-link xlink:href="https://www.cbinsights.com/research/report/famga-big-tech-cybersecurity/" xmlns:xlink="http://www.w3.org/1999/xlink" ext-link-type="uri">https://www.cbinsights.com/research/report/famga-big-tech-cybersecurity/</ext-link>.</mixed-citation></ref>
<ref id="r57"><label>57</label><mixed-citation publication-type="book">Kockan C. Privacy-Preserving Algorithms for Secure Genome Analysis in Trusted Execution Environments: Indiana University; 2021.</mixed-citation></ref>
<ref id="r58"><label>58</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name name-style="western"><surname>Gutierrez</surname> <given-names>JB</given-names></string-name>, <string-name name-style="western"><surname>Harb</surname> <given-names>OS</given-names></string-name>, <string-name name-style="western"><surname>Zheng</surname> <given-names>J</given-names></string-name>, <string-name name-style="western"><surname>Tisch</surname> <given-names>DJ</given-names></string-name>, <string-name name-style="western"><surname>Charlebois</surname> <given-names>ED</given-names></string-name>, <string-name name-style="western"><surname>Stoeckert</surname> <suffix>Jr</suffix> <given-names>CJ</given-names></string-name>, <string-name name-style="western"><surname>Sullivan</surname> <given-names>SA</given-names></string-name></person-group>. <article-title>A framework for global collaborative data management for malaria research.</article-title> <source>The American journal of tropical medicine and hygiene.</source> <year>2015</year>;<volume>93</volume>(<issue>3</issue> <supplement>Suppl</supplement>):<fpage>124</fpage>. <pub-id pub-id-type="doi">10.4269/ajtmh.15-0003</pub-id><pub-id pub-id-type="pmid">26259944</pub-id></mixed-citation></ref>
<ref id="r59"><label>59</label><mixed-citation publication-type="other">Kalita E. WannaCry ransomware attack: Protect yourself from WannaCry ransomware cyber risk and cyber war. Independently published; 2017.</mixed-citation></ref>
<ref id="r60"><label>60</label><mixed-citation publication-type="web">Tran C. The SolarWinds attack and its lessons. E-International Relations https://www e-ir info/2021/06/17/the-solarwinds-attack-and-its-lessons. 2021.</mixed-citation></ref>
</ref-list>
</back>
</article>
