Cyberbiosecurity applies cybersecurity research to the field of biology, and, to a lesser degree, applies biological principles to the field of cybersecurity. As biologists increasingly research, collaborate, and conduct research online, cyberbiosecurity has become crucial to protect against cyber threats. This book provides an overview of cyberbiosecurity through the lens of researchers in academia, industry professionals, and government, in both biology and cybersecurity fields. The book highlights emerging technologies, and identifies emerging threats connected with these technologies,…mehr
Cyberbiosecurity applies cybersecurity research to the field of biology, and, to a lesser degree, applies biological principles to the field of cybersecurity. As biologists increasingly research, collaborate, and conduct research online, cyberbiosecurity has become crucial to protect against cyber threats. This book provides an overview of cyberbiosecurity through the lens of researchers in academia, industry professionals, and government, in both biology and cybersecurity fields. The book highlights emerging technologies, and identifies emerging threats connected with these technologies, while also providing a discussion of the legal implications involved. This book takes on a multidisciplinary approach, and appeals to both professionals and researchers in the synthetic biology, bioinformatics, and cybersecurity fields.
Dov Greenbaum is Director of the Zvi Meitar Institute for Legal Implications of Emerging Technologies and a professor of law at the Harry Radzyner Law School, Reichman University, Herzliya, Israel (IDC). Dov is also an affiliate researcher in the Department of Molecular Biophysics and Biochemistry at Yale University. Dov is a certified Information Privacy Professional, Europe (CIPP/E), the editor of Frontiers in ELSI in Science and Genetics. He is also an intellectual property attorney, licensed to practice in California and before the United States Patent and Trademark Office.
Inhaltsangabe
Introduction: Origin and Intent for the New Field of Cyberbiosecurity.- Cyber and information security in the bioeconomy.- Palmer Mission-Aware Differences in Cyberbiosecurity and Biocybersecurity Policies: Prevention, Detection, and Elimination.- Revisiting the Digital Biosecurity Landscape.- Security Vulnerabilities and Countermeasures for the Biomedical Data Life Cycle.- Cybersecurity Across the DNA-Digital Boundary: DNA Samples to Genomic Data.- Applying CVSS to Vulnerability Scoring in Cyber-Biological Systems.- Biocrime, the Internet-of-Ingestible-Things and Cyber-biosecurity.- Potentials of pathogen research through the lens of cyberbiosecurity, or what threat actors can learn from the Covid-19 pandemic.- How to Protect Biotechnology and Biosecurity from Adversarial AI Attacks? A Global Governance Perspective.- Safeguarding the Guardians to Safeguard the Bio-Economy and Mitigate Social Injustices.- AI for Cyberbiosecurity inWater Systems - A Survey.- Artificial intelligence and the weaponization of genetic data.- The Attack Surface of Wet-lab Automation.
Introduction: Origin and Intent for the New Field of Cyberbiosecurity.- Cyber and information security in the bioeconomy.- Palmer Mission-Aware Differences in Cyberbiosecurity and Biocybersecurity Policies: Prevention, Detection, and Elimination.- Revisiting the Digital Biosecurity Landscape.- Security Vulnerabilities and Countermeasures for the Biomedical Data Life Cycle.- Cybersecurity Across the DNA-Digital Boundary: DNA Samples to Genomic Data.- Applying CVSS to Vulnerability Scoring in Cyber-Biological Systems.- Biocrime, the Internet-of-Ingestible-Things and Cyber-biosecurity.- Potentials of pathogen research through the lens of cyberbiosecurity, or what threat actors can learn from the Covid-19 pandemic.- How to Protect Biotechnology and Biosecurity from Adversarial AI Attacks? A Global Governance Perspective.- Safeguarding the Guardians to Safeguard the Bio-Economy and Mitigate Social Injustices.- AI for Cyberbiosecurity inWater Systems - A Survey.- Artificial intelligence and the weaponization of genetic data.- The Attack Surface of Wet-lab Automation.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497