Integrating Cybersecurity into Veterinary Medicine: Protecting Animal Health Data and Systems
DOI:
https://doi.org/10.33448/rsd-v14i5.47190Keywords:
Cybersecurity, Veterinary Medicine, Cybercrime, Cyber attack.Abstract
Cyberbiosecurity is an emerging field at the convergence of life sciences and the digital world. The aim of this study is to analyze the importance of cyber security for veterinary clinics, practices, laboratories and hospitals by presenting the dangers, consequences and methodologies for defending against cyber attacks. During the practice of veterinary medicine, the storage of a significant amount of high-value data makes veterinary practices, clinics, laboratories and hospitals significant targets for cybercriminals. Currently, veterinary institutions have been victims of cyber attacks mainly through suspicious emails (phishing), text messages (smishing) and voice calls (vishing). Therefore, it is of fundamental importance to implement security measures that can protect veterinary institutions from attacks by cybercriminals.
Downloads
References
Al-Hawawreh, M., Aljuhani, A. & Jararweh, Y. (2023). ChatGPT For Cybersecurity: Practical Applications, Challenges, and Future Directions. 26, 3421–3436
Almutairi, B.S. and Alghamdi, A. (2022) The Role of Social Engi neering in Cybersecurity and Its Impact. Journal of Information Security, 13, 363-379.
Bullée, JW., Junger, M. (2020). Social Engineering. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_38
Casarin, S. T. et al. (2020). Tipos de revisão de literatura: considerações das editoras do Journal of Nursing and Health/Types of literature review: considerations of the editors of the Journal of Nursing and Health. Journal of Nursing and Health,10(5). DOI: https://doi.org/10.15210/jonah.v10i5.19924. https://periodicos.ufpel.edu.br/index.php/enfermagem/article/view/19924.
Cubo, E., Arnaiz-Rodriguez, A., Arnaiz-González, Á., Díez-Pastor, J. F., Spindler, M., Cardozo, A., Garcia-Bustillo, A., Mari, Z., & Bloem, B. R. (2021). Videoconferencing Software Options for Telemedicine: A Review for Movement Disorder Neurologists. Frontiers in neurology, 12, 745917.
Cushing M. (2022). What Is Telemedicine, Telehealth, and Teletriage. The Veterinary clinics of North America. Small animal practice, 52(5), 1069–1080.
Dawson, M., Wright, J., & Omar, M. (2016). Mobile Devices: The Case for Cyber Security Hardened Systems. In I. Management Association (Ed.), Mobile Computing and Wireless Networks: Concepts, Methodologies, Tools, and Applications (pp. 1103-1123). IGI Global Scientific Publishing. https://doi.org/10.4018/978-1-4666-8751-6.ch047
Drăghici, D (2023). The Internet, lifestyle and Society. European Proceedings of Educational Sciences. Edu World 2022 p.160-167
Paynter, A. N., Dunbar, M. D., Creevy, K. E., & Ruple, A. (2021). Veterinary Big Data: When Data Goes to the Dogs. Animals: an open access journal from MDPI, 11(7), 1872.
El Idrissi, A. H., Larfaoui, F., Dhingra, M., Johnson, A., Pinto, J., & Sumption, K. (2021). Digital technologies and implications for Veterinary Services. Digital technologies and implications for Veterinary Services. Revue scientifique et technique (International Office of Epizootics), 40(2), 455–468. https://doi.org/10.20506/rst.40.2.3237
Fernandes, M. E., & Nuzzi, A. P. E. (2022). Fundamentos da Lei Geral de Proteção de Dados (LGPD): uma revisão narrativa. Research, Society and Development, 11(12), e310111234247.
Jedličková A. (2024). Ethical dimensions in telemedicine - balancing technology, responsible care, and patient protection. Etické aspekty v telemedicíně – balancování mezi výhodami technologií, odpovědnou péčí a ochranou pacienta. Casopis lekaru ceskych, 163(3), 106–114.
Li Y & Liu Q (2021). A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments. Energy Reports 7, p.8176–8186.
Maurya, A.K., Kumar, N., Agrawal, A. & Khan, R. A. (2018). Ransomware: Evolution, Target and Safety Measures. International Journal of Computer Sciences and Engineering, 6(1), 80-85.
Oliveira, V. F. M. Q. de. (2021). Cibersegurança e Inteligência Artificial: Como garantir a segurança de um Sistema de Informação. Dissertação (Metrado) Mestrado em Gestão de Informação, especialização em Gestão dos Sistemas e Tecnologias de Informação. http://hdl.handle.net/10362/117660
Kang, H.; Liu, G.; Wang, Q.; Meng, L. & Liu, J. (2023). Theory and Application of Zero Trust Security: A Brief Survey. Entropy. 25, 1595
Kauthamy, K., Ashrafi, N. & Kuilboer, J-P. (2017). Mobile Devices and Cyber Security An Exploratory Study on User’s Response to Cyber Security Challenges. In Proceedings of the 13th International Conference on Web Information Systems and Technologies (WEBIST 2017), pages 306-311
Mattos, P. C. (2015). Tipos de revisão de literatura. Unesp, 1-9. https://www.fca.unesp.br/Home/Biblioteca/tipos-de-evisao-de-literatura.pdf.
Mishra, S., & Soni, D. (2023). DSmishSMS-A System to Detect Smishing SMS. Neural computing & applications, 35(7), 4975–4992. https://doi.org/10.1007/s00521-021-06305-y
Mazzarolo, G & Jurcut, A. D. (2020). Insider threats in Cyber Security: The enemy within the gates. European Cybersecurity Journal. 6(1), 57-63.
Mendes, C. (2022). O que é uma revisão narrativa de literatura: exemplos e considerações da metodologia. https://www.youtube.com/watch?v=YlBWSVsxvRM
Pereira, A. S. et al. (2018). Metodologia da pesquisa científica. [free ebook]. Editora da UFSM.
Rother, E. T. (2007). Revisão sistemática x revisão narrativa. Acta paul. enferm. 20 (2). https://doi.org/10.1590/S0103-21002007000200001.
Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of business research, 104, 333-339.
Sousa, A. S.; Oliveira, G. S.; Alves, L. H (2021). A pesquisa bibliográfica: princípios e fundamentos. Cadernos da Fucamp, 20(43). https://revistas.fucamp.edu.br/index.php/cadernos/article/view/2336.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Angela Mazzeo; Enrico Jardim Clemente Santos

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
1) Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2) Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3) Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.