2019
DOI: 10.3389/fbioe.2019.00106
|View full text |Cite
|
Sign up to set email alerts
|

Cyberbiosecurity Challenges of Pathogen Genome Databases

Abstract: Pathogen detection, identification, and tracking is shifting from non-molecular methods, DNA fingerprinting methods, and single gene methods to methods relying on whole genomes. Viral Ebola and influenza genome data are being used for real-time tracking, while food-borne bacterial pathogen outbreaks and hospital outbreaks are investigated using whole genomes in the UK, Canada, the USA and the other countries. Also, plant pathogen genomes are starting to be used to investigate plant disease epidemics such as th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(24 citation statements)
references
References 65 publications
(70 reference statements)
0
24
0
Order By: Relevance
“…Nonetheless, cyberbiosecurity is still in its infancy. There is still limited expertise to fully characterize and assess the emerging cyberbio risks [ 8 ], and it has been recognized that generic cyber and information security measures are insufficient [ [8] , [9] , [10] , [11] , [12] , [13] , [14] ].…”
Section: Motivationmentioning
confidence: 99%
See 3 more Smart Citations
“…Nonetheless, cyberbiosecurity is still in its infancy. There is still limited expertise to fully characterize and assess the emerging cyberbio risks [ 8 ], and it has been recognized that generic cyber and information security measures are insufficient [ [8] , [9] , [10] , [11] , [12] , [13] , [14] ].…”
Section: Motivationmentioning
confidence: 99%
“… V “The intellectual property, manufacturing processes, regulatory requirements and sophisticated cyber-physical systems involved in the production of biologic therapies may be particularly vulnerable to three major forms of cyberattacks: sabotage (deliberate and malicious acts that damage digital or physical infrastructure), corporate espionage (gaining access to sensitive information to attain advantage over an adversary), and crime/extortion (encrypting files with a ransom note asking for remuneration for their return) (Morag, 2014).” ibid. V Biological Databases “The more we rely on genome databases, the more likely these databases will become targets for cyber-attacks to interfere with public health and biosecurity systems by compromising their integrity, taking them hostage, or manipulating the data they contain.” [ 12 ] C “Many web sites provide methods for users to upload data. Interestingly, there seems to be no case where the data integrity is checked during the transfer process....” ibid.…”
Section: The Uniqueness and Challenge Of Cyberbio Protectionmentioning
confidence: 99%
See 2 more Smart Citations
“…Though surveillance and management methods can be effectively applied to prevent severe impacts, many of the fungi causing outbreaks have no cure. The past few decades have witnessed an increasing number of severe fungal infectious diseases in natural populations of humans, animals and plants (Vinatzer et al, 2019). As with the recent global challenge of the novel coronavirus disease (COVID-19) in humans, scientists predict that a potential crop pandemic will occur sooner rather than later.…”
Section: Introductionmentioning
confidence: 99%