Cyberbiosecurity in biointelligent environments: Integrating artificial intelligence, synthetic biology and automation in vital sectors
DOI:
https://doi.org/10.33448/rsd-v14i6.48937Keywords:
Cyberbiosecurity, Biotechnology, Cyber security, Artificial intelligence, Synthetic biology.Abstract
This study aims to analyze the importance of cybersecurity in the context of systems related to the biological sciences in different sectors of the economy, which is called cyberbiosecurity. A narrative bibliographic survey was carried out. Technological innovation has become an inherent aspect of our society's existence, since practically every item relevant to our daily lives has at least one cyber component associated with it. These include personal computers, computer networks, information technology and virtual reality. Life sciences are now interfacing with information technology and cyber security. This convergence has resulted in significant growth in the biotechnology sector and its applications in health, agriculture, manufacturing, automation, artificial intelligence and synthetic biology. This has necessitated the creation of a discipline that encompasses the scope of biosecurity and cyber-physical security and cyberbiosecurity which has been termed cyberbiosecurity which involves the understanding, protection, mitigation, investigation and attribution of unwanted surveillance, intrusions and malicious and damaging activities that may occur within or at the interfaces of the medical and life sciences, affecting security, competitiveness and resilience.
Downloads
References
Arshad, S., Arshad, J., Khan, M. M., & Parkinson, S. (2021). Analysis of security and privacy challenges for DNA-genomics applications and databases. Journal of biomedical informatics, 119, 103815. https://doi.org/10.1016/j.jbi.2021.103815
Carman, A. (2014). Dragonfly Malware was Designed to Target Pharmaceutical Companies. SC Magazine. Available online at: https://www.scmagazine.com/home/security-news/dragonfly-malware-was-designed-to-target-pharmaceutical-companies/ (accessed August 11, 2019).
Casarin, S. T. et al. (2020). Tipos de revisão de literatura: considerações das editoras do Journal of Nursing and Health/Types of literature review: considerations of the editors of the Journal of Nursing and Health. Journal of Nursing and Health,10(5). DOI: https://doi.org/10.15210/jonah.v10i5.19924. https://periodicos.ufpel.edu.br/index.php/enfermagem/article/view/19924.
Chakravarthi, P. G.; Rambabu V; Ramamurty DSVNM; Rahul G. & Prasad SVGVA. AI and Machine Learning in Biotechnology: A Paradigm Shift in Biochemical Innovation. International Journal of Plant, Animal and Environmental Sciences. 14(2024), 70-80. DOI: 10.26502/ijpaes.4490166
Chi, H., Welch, S., Vasserman, E., & Kalaimannan, E. (2017). “A Framework of Cybersecurity Approaches in Precision Agriculture. in” proceedings of the ICMLG2017 5th International Conference on Management Leadership and Governance, Dayton, USA, 2–3 March, 2017. Reading, UK: Academic Conferences and Publishing Limited, 90–95.
Cuningkin, V., Riley, E., & Rainey, L. (2021). Preventing Medjacking. The American journal of nursing, 121(10), 46–50. https://doi.org/10.1097/01.NAJ.0000794252.99183.5e
Duncan, S. E., Reinhard, R., Williams, R. C., Ramsey, F., Thomason, W., Lee, K. & Dudek, N., Mostaghimi, S., Colbert, E., & Murch, R. (2019). Ciberbiossegurança: uma nova perspectiva sobre a proteção do sistema alimentar e agrícola dos EUA. Fronteiras em bioengenharia e biotecnologia, 7, 63. https://doi.org/10.3389/fbioe.2019.00063
Emergen Research (2020). Smart Farming Market by Farming Type (Livestock Monitoring, Precision Farming, Others), by Offerings (Software, Hardware, Others), and by Application (Livestock Monitoring Application, Precision Farming Application, Others), Forecasts to 2027. Available at: https://www.emergenresearch.com/industry-report/smart-farming-market
Geil A., Sagers G., Spaulding A. D., & Wolf J. R. (2018). Cyber Security on the Farm: an Assessment of Cyber Security Practices in the United States Agriculture Industry. Int. Food Agribusiness Manage. Rev. 21 (1030-2018-1811), 317–334. 10.22434/ifamr2017.0045
Gibson, D. G., Glass, J. I., Lartigue, C., Noskov, V. N., Chuang, R. Y., Algire, M. A., Benders, G. A., Montague, M. G., Ma, L., Moodie, M. M., Merryman, C., Vashee, S., Krishnakumar, R., Assad-Garcia, N., Andrews-Pfannkoch, C., Denisova, E. A., Young, L., Qi, Z. Q., Segall-Shapiro, T. H., Calvey, C. H. & Venter, J. C. (2010). Creation of a bacterial cell controlled by a chemically synthesized genome. Science (New York, N.Y.), 329(5987), 52–56. https://doi.org/10.1126/science.1190719
Helu, M., & Hedberg, T., Jr (2015). Enabling Smart Manufacturing Research and Development using a Product Lifecycle Test Bed. Procedia manufacturing, 1, 86–97. https://doi.org/10.1016/j.promfg.2015.09.066
Jalali, M. S., Landman, A., & Gordon, W. J. (2021). Telemedicine, privacy, and information security in the age of COVID-19. Journal of the American Medical Informatics Association: JAMIA, 28(3), 671–672. https://doi.org/10.1093/jamia/ocaa310
Khera, M. (2017). Think Like a Biohacker. Journal of diabetes science and technology, 11(2), 207–212. https://doi.org/10.1177/1932296816677576
Kiss, A. A., Grievink, J. & Rito-Palomares, M. (2014). A systems engineering perspective on process integration in industrial biotechnology. J. Chem. Tech. Biotech. 90, 349–355. 10.1002/jctb.4584
Mazzeo, A & Santos, E J C. (2025a). Integrating Cybersecurity into Veterinary Medicine: Protecting Animal Health Data and Systems. Research, Society and Development, 14(5), e7414547190. https://doi.org/10.33448/rsd-v14i5.47190
Mazzeo, A & Santos, E J C. (2025b). Integration of biomedical devices and the internet of bodies revolution. Research, Society and Development, 14(5), e11814548921. https://doi.org/10.33448/rsd-v14i5.48921
McCulloch, W.S. & Pitts, W. (1943). A logical calculus of the ideas immanent in nervous activity. Bulletin of Mathematical Biophysics 5, 115–133 (1943). https://doi.org/10.1007/BF02478259
Mendes, C. (2022). O que é uma revisão narrativa de literatura: exemplos e considerações da metodologia. https://www.youtube.com/watch?v=YlBWSVsxvRM
Morag, N. (2014). Cybercrime, Cyberespionage, and Cybersabotage: Understanding Emerging Threats. Colorado Technical University: College of Security Studies. Available online at: https://www.coloradotech.edu/media/default/CTU/documents/resources/cybercrime-white-paper.pdf (accessed August 11, 2019).
Murch, R. S., So, W. K., Buchholz, W. G., Raman, S., & Peccoud, J. (2018). Cyberbiosecurity: An Emerging New Discipline to Help Safeguard the Bioeconomy. Frontiers in bioengineering and biotechnology, 6, 39. https://doi.org/10.3389/fbioe.2018.00039
Murch, R., & DiEuliis, D. (2019). Editorial: Mapping the Cyberbiosecurity Enterprise. Frontiers in bioengineering and biotechnology, 7, 235. https://doi.org/10.3389/fbioe.2019.00235
Nayak, J., Meher, S. K., Souri, A., Naik, B., & Vimal, S. (2022). Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection. The Journal of supercomputing, 78(13), 14866–14891. https://doi.org/10.1007/s11227-022-04453-z
Nielsen, J., & Keasling, J. D. (2011). Synergies between synthetic biology and metabolic engineering. Nature biotechnology, 29(8), 693–695. https://doi.org/10.1038/nbt.1937
Osborne, C. (2018). US Hospital Pays $55,000 to Biohackers After Ransomware Attack. ZDNet. Available online at: https://www.zdnet.com/article/us-hospital-pays-55000-to-ransomware-operators/ (accessed August 11, 2019).
Peccoud, J., Gallegos, J. E., Murch, R., Buchholz, W. G., & Raman, S. (2018). Cyberbiosecurity: From Naive Trust to Risk Awareness. Trends in biotechnology, 36(1), 4–7. https://doi.org/10.1016/j.tibtech.2017.10.012
Pereira, A. S. et al. (2018). Metodologia da pesquisa científica. [free ebook]. Santa Maria: Ed. UFSM.
Pinkham, D. W., Sala, I. M., Soisson, E. T., Wang, B., & Deeley, M. A. (2021). Are you ready for a cyberattack?. Journal of applied clinical medical physics, 22(10), 4–7. https://doi.org/10.1002/acm2.13422
Purnick, P. E., & Weiss, R. (2009). The second wave of synthetic biology: from modules to systems. Nature reviews. Molecular cell biology, 10(6), 410–422. https://doi.org/10.1038/nrm2698
Richardson, L. C., Lewis, S. M., & Burnette, R. N. (2019). Building Capacity for Cyberbiosecurity Training. Frontiers in bioengineering and biotechnology, 7, 112. https://doi.org/10.3389/fbioe.2019.00112
Rollin, J. A., Tam, T. K. & Zhang, Y. H. P. (2013). New biotechnology paradigm: cell-free biosystems for biomanufacturing. Green Chem. 15, 1708–1719. 10.1039/c3gc40625c
Rother, E. T. (2007). Revisão sistemática x revisão narrativa. Acta paul. enferm. 20 (2). https://doi.org/10.1590/S0103-21002007000200001.
Shannon, C. E. (1950). A Chess-Playing Machine. Scientific American, 182(2), 48–51. DOI:10.1007/978-1-4613-8716-9_6
Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of business research, 104, 333-339.
Sousa, A. S.; Oliveira, G. S.; & Alves, L. H (2021). A pesquisa bibliográfica: princípios e fundamentos. Cadernos da Fucamp, 20(43). https://revistas.fucamp.edu.br/index.php/cadernos/article/view/2336
Sykuta, M. E. (2016). Big data in agriculture: property rights, privacy and competition in ag data services. Internat. Food Agribusiness Manage. Rev. 19, 57–74.
Toosi, A., Bottino, A., Saboury, B. & Rahmim, A. (2021) A brief history ofAI: how to prevent another winter (a critical review). PET Clin.https://doi.org/10.1016/j.cpet.2021.07.001
Van der Linden, D., Michalec, O. A. & Zamansky, A. (2020). Cybersecurity for Smart Farming: Socio-Cultural Context Matters. IEEE Technol. Soc. Mag. 39 (4), 28–35. 10.1109/mts.2020.3031844
Verseux, C. N., Paulino-Lima, I. G., Baqué, M., Billi, D. & Rothschild, L. J. (2016). Synthetic Biology for Space Exploration: Promises and Societal Implications. In: Hagen, K., Engelhard, M., Toepfer, G. (eds) Ambivalences of Creating Life. Ethics of Science and Technology Assessment, vol 45. Springer, Cham. https://doi.org/10.1007/978-3-319-21088-9_4
Wang, T., Tu, M., Lyu, H., Li, Y., Orfila, O., Zou, G., & Gruyer, D. (2022). Impact Evaluation of Cyberattacks on Connected and Automated Vehicles in Mixed Traffic Flow and Its Resilient and Robust Control Strategy. Sensors (Basel, Switzerland), 23(1), 74. https://doi.org/10.3390/s23010074
You, E., & Kozminski, K. G. (2015). Biosecurity in the age of Big Data: a conversation with the FBI. Molecular biology of the cell, 26(22), 3894–3897. https://doi.org/10.1091/mbc.E14-01-0027
Zhong, R. Y., Xu, X., Klotz, E. & Newman, S. T. (2017). Intelligent manufacturing in the context of industry 4.0: A review. Engineering 3, 616–630. 10.1016/J.ENG.2017.05.015
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Enrico Jardim Clemente Santos; Angela Mazzeo

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
1) Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2) Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3) Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.