Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2019 Mar 29:7:61.
doi: 10.3389/fbioe.2019.00061. eCollection 2019.

Assessing Cyberbiosecurity Vulnerabilities and Infrastructure Resilience

Affiliations

Assessing Cyberbiosecurity Vulnerabilities and Infrastructure Resilience

Daniel S Schabacker et al. Front Bioeng Biotechnol. .

Abstract

The convergence of advances in biotechnology with laboratory automation, access to data, and computational biology has democratized biotechnology and accelerated the development of new therapeutics. However, increased access to biotechnology in the digital age has also introduced additional security concerns and ultimately, spawned the new discipline of cyberbiosecurity, which encompasses cybersecurity, cyber-physical security, and biosecurity considerations. With the emergence of this new discipline comes the need for a logical, repeatable, and shared approach for evaluating facility and system vulnerabilities to cyberbiosecurity threats. In this paper, we outline the foundation of an assessment framework for cyberbiosecurity, accounting for both security and resilience factors in the physical and cyber domains. This is a unique problem set, but despite the complexity of the cyberbiosecurity field in terms of operations and governance, previous experience developing and implementing physical and cyber assessments applicable to a wide spectrum of critical infrastructure sectors provides a validated point of departure for a cyberbiosecurity assessment framework. This approach proposes to integrate existing capabilities and proven methodologies from the infrastructure assessment realm (e.g., decision science, physical security, infrastructure resilience, cybersecurity) with new expertise and requirements in the cyberbiosecurity space (e.g., biotechnology, biomanufacturing, genomics) in order to forge a flexible and defensible approach to identifying and mitigating vulnerabilities. Determining where vulnerabilities reside within cyberbiosecurity business processes can help public and private sector partners create an assessment framework to identify mitigation options for consideration that are both economically and practically viable and ultimately, allow them to manage risk more effectively.

Keywords: convergence; converging; cyberbiosecurity; emerging; resilience; risk; technology; vulnerability.

PubMed Disclaimer

Figures

Figure 1
Figure 1
Risk management. By understanding the likelihood of various threats and hazards, associated vulnerabilities, potential consequences, and resilience characteristics, stakeholders can make informed decisions on ways to manage risk (i.e., accept, transfer, avoid, or mitigate).

References

    1. Dengg A. (Ed.). (2018). Tomorrow's Technology – A Double-Edged Sword. Vienna. Available online at: http://www.bundesheer.at/pdf_pool/publikationen/buch_dengg_tomorrows_tec...
    1. Evans N. (2009). Information Technology Social Engineering: An Academic Definition and Study of Social Engineering-Analyzing The Human Firewall. Digital Repository@ Iowa State University.
    1. Fisher R. E., Buehring W. A., Whitfield R. G., Bassett G. W., Dickinson D. C., Haffenden R. A., et al. (2009). Constructing Vulnerability and Protective Measures Indices for the Enhanced Critical Infrastructure Protection Program, ANL/DIS-09–S-04.
    1. Joyce A. L., Petit F. D., Phillips J. A., Nowak L. B., Evans N. J. (2017). Cyber Protection and Resilience Index: An Indicator of an Organization's Cyber Protection and Resilience Program. Available online at: https://www.osti.gov/servlets/purl/1433503
    1. Keeney R. L., Raiffa H. (1976). Decision Making with Multiple Objectives Preferences and Value Tradeoffs. New York, NY: Wiley.

LinkOut - more resources