A Reflection on Typology and Verification Flaws in consideration of Biocybersecurity/Cyberbiosecurity: Just Another Gap in the Wall

Lucas Potter, Kimberly Mossberg, X. Palmer
{"title":"A Reflection on Typology and Verification Flaws in consideration of Biocybersecurity/Cyberbiosecurity: Just Another Gap in the Wall","authors":"Lucas Potter, Kimberly Mossberg, X. Palmer","doi":"10.34190/eccws.22.1.1271","DOIUrl":null,"url":null,"abstract":"Verification is central to any process in a functional and enduring cyber-secure organization. This verification ishow the validity or accuracy of a state of being is assessed (Schlick, 1936; Balci, 1998). Conversely, breakdownin verification procedures is core to the interruption of normal operations for an organization. A key problemfor organizations that utilize biology as an interlock within their systems is that personnel lack sufficient abilityto verify all practically relevant biological information for procedures such as a nurse logging a blood draw, or amolecular biology technician preparing agar to culture microbes for study. This has several implications, one ofwhich is our diminished ability to approximate and defend against emerging biologically-linked cyberthreats.These could be in the form of mis- or dis-information, contaminants, or calculated threats to vital supplies.Two important questions to ask are: “What may be the implications of diminished ability to undergo strictverification measures (such as triple redundancy and technological distancing).” And “how does this impactour ability to anticipate and make changes for verification of biological processes?” This paper aims to discusskey areas where verification gaps exist and how to bridgethos gaps. Towards this, we cover data integrity,implications of the lack of verification, triple redundancy, technological distancing, biosafety concerns, andmore. All of this will factor into the ability of organizations with proximity to biosecurity to anticipate nationalchanges to biological processes that are nationally relevant.","PeriodicalId":258360,"journal":{"name":"European Conference on Cyber Warfare and Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Conference on Cyber Warfare and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.34190/eccws.22.1.1271","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Verification is central to any process in a functional and enduring cyber-secure organization. This verification ishow the validity or accuracy of a state of being is assessed (Schlick, 1936; Balci, 1998). Conversely, breakdownin verification procedures is core to the interruption of normal operations for an organization. A key problemfor organizations that utilize biology as an interlock within their systems is that personnel lack sufficient abilityto verify all practically relevant biological information for procedures such as a nurse logging a blood draw, or amolecular biology technician preparing agar to culture microbes for study. This has several implications, one ofwhich is our diminished ability to approximate and defend against emerging biologically-linked cyberthreats.These could be in the form of mis- or dis-information, contaminants, or calculated threats to vital supplies.Two important questions to ask are: “What may be the implications of diminished ability to undergo strictverification measures (such as triple redundancy and technological distancing).” And “how does this impactour ability to anticipate and make changes for verification of biological processes?” This paper aims to discusskey areas where verification gaps exist and how to bridgethos gaps. Towards this, we cover data integrity,implications of the lack of verification, triple redundancy, technological distancing, biosafety concerns, andmore. All of this will factor into the ability of organizations with proximity to biosecurity to anticipate nationalchanges to biological processes that are nationally relevant.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
对生物网络安全的类型学和验证缺陷的反思/网络生物安全:只是墙上的另一个缺口
在一个功能性和持久的网络安全组织中,验证是任何过程的核心。这种验证表明存在状态的有效性或准确性被评估(Schlick, 1936;Balci, 1998)。相反,验证程序的中断是组织正常运作中断的核心。对于利用生物学作为其系统内联锁的组织来说,一个关键问题是人员缺乏足够的能力来验证所有实际相关的生物信息,例如护士记录抽血,或分子生物学技术人员准备琼脂培养微生物进行研究。这有几个含义,其中之一是我们逼近和防御新兴的生物相关网络威胁的能力下降。这些可能以错误或虚假信息、污染物或对重要供应的蓄意威胁的形式出现。要问的两个重要问题是:“经过严格核查措施(如三重冗余和技术距离)的能力减弱可能意味着什么?”“这对预测和改变生物过程验证的能力有何影响?”本文旨在讨论存在验证差距的关键领域以及如何弥合这些差距。为此,我们涵盖了数据完整性、缺乏验证的影响、三重冗余、技术距离、生物安全问题等等。所有这些都将影响到与生物安全相关的组织预测与国家相关的生物过程的国家变化的能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
From Provoking Emotions to fake Images: The Recurring Signs of fake news and Phishing Scams Spreading on Social Media in Hungary, Romania and Slovakia A Commentary and Exploration of Maritime Applications of Biosecurity and Cybersecurity Intersections Cultural Influences on Information Security Processing Model and Classification of Cybercognitive Attacks: Based on Cognitive Psychology Role of Techno-Economic Coalitions in Future Cyberspace Governance: 'Backcasting' as a Method for Strategic Foresight
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1