Lucas Potter | Old Dominion University (original) (raw)
Papers by Lucas Potter
arXiv (Cornell University), Apr 17, 2020
Within the field of biocybersecurity, it is important to understand what vulnerabilities may be u... more Within the field of biocybersecurity, it is important to understand what vulnerabilities may be uncovered in the processing of biologics as well as how they can be safeguarded as they intersect with cyber and cyber-physical systems, as noted by the Peccoud Lab, to ensure not only product and brand integrity, but protect those served. Recent findings have revealed that biological systems can be used to compromise computer systems and vice versa. While regular and sophisticated attacks are still years away, time is of the essence to better understand ways to deepen critique and grasp intersectional vulnerabilities within bioprocessing as processes involved become increasingly digitally accessible. Wargames have been shown to be successful within improving group dynamics in response to anticipated cyber threats, and they can be used towards addressing possible threats within biocybersecurity. Within this paper, we discuss the growing prominence of biocybersecurity, the importance of biocybersecurity to bioprocessing , with respect to domestic and international contexts, and reasons for emphasizing the biological component in the face of explosive growth in biotechnology and thus separating the terms biocybersecurity and cyberbiosecurity. Additionally, a discussion and manual is provided for a simulation towards organizational learning to sense and shore up vulnerabilities that may emerge within an organization's bioprocessing pipeline
Proceedings of the Future Technologies Conference (FTC) 2023, Volume 4
International journal of cyber warfare and terrorism, Jul 1, 2021
The evolving nature of warfare has been changing with cybersecurity and the use of advanced biote... more The evolving nature of warfare has been changing with cybersecurity and the use of advanced biotechnologyineachaspectofthesocietyisexpandingandoverlappingwiththecyberworld.This intersection, which has been described as "biocybersecurity" (BCS), can become a major front ofthe21st-centuryconflicts.TherearethreelinesofBCSwhichmakeitacriticalcomponentof overallcybersecurity:(1)cyberoperationswithintheareaofBCShavelifethreateningconsequences toagreaterextentthanothercyberoperations,(2)thebreachinhealth-relatedpersonaldataisa significanttoolforfatalattacks,and(3)health-relatedmisinformationcampaignsasacomponent ofBCScancausesignificantdamagecomparedtoothermisinformationcampaigns.Basedonthe observationthatratherthaninitiatingthenecessarycooperationCOVID-19helpedexacerbatethe existingconflicts,theauthorssuggestthatBCSneedstobeconsideredasanessentialcomponent ofthecyberdoctrine,withintheDefendingForwardframework.Thefindingsareexpectedtohelp futurecyberpolicydevelopments.
Springer eBooks, Oct 25, 2021
Nano-Pulse Stimulation (NPS), a pulsed power-derived technology, stimulates structural and functi... more Nano-Pulse Stimulation (NPS), a pulsed power-derived technology, stimulates structural and functional changes in plasma membranes and cellular organelles. NPS induces a Ca 2+ influx and opening of the mitochondrial permeability transition pore (mPTP) that dissipates the mitochondrial membrane potential (ΔΨ m) and, when sustained, induces regulated cell death. Here we show that in rat cardiomyoblasts (H9C2) cyclophilin D (CypD) is a mitochondrial sensor for NPS as defined by observations that loss of ΔΨ m is Ca 2+ and mitochondrial reactive oxygen species (mROS) dependent and cyclosporin A (CsA)-sensitive, which are diagnostic qualities for effects on CypD and the mPTP. Mechanistically, NPS stimulates increases in intracellular Ca 2+ which enhances mROS in a dose dependent manner. The regulatory role of CypD on mPTP activation, is effectively inhibited at low Ca 2+ concentrations and/or by CsA. Although NPS-induced dissipation of ΔΨ m is largely Ca 2+dependent, the degree of Ca 2+ sensitivities vary among cell types. Nevertheless, knockdown of the proapoptotic protein, APAF-1, and overexpression of the antiapoptotic protein, Bcl-xl, in human Jurkat T lymphocytes (E6.1) did not affect NPS-induced dissipation of ΔΨ m or cell death. Taken together, these results indicate NPS induces activation of the mPTP through Ca 2+-dependent, mROS-dependent, CsA-sensitive dissipation of the ΔΨ m that is independent of caspase activation and insensitive to protection by Bcl-xl.
arXiv (Cornell University), Oct 1, 2020
Biodefense is the discipline of ensuring biosecurity with respect to select groups of organisms a... more Biodefense is the discipline of ensuring biosecurity with respect to select groups of organisms and limiting their spread. This field has increasingly been challenged by novel threats from nature that have been weaponized such as SARS, Anthrax, and similar pathogens, but has emerged victorious through collaboration of national and world health groups. However, it may come under additional stress in the 21st century as the field intersects with the cyberworld-a world where governments have already been struggling to keep up with cyber attacks from small to state-level actors as cyberthreats have been relied on to level the playing field in international disputes. Disruptions to military logistics and economies through cyberattacks have been able to be done at a mere fraction of economic and moral costs through conventional military means, making it an increasingly tempting means of disruption. In the field of biocybersecurity (BCS), the strengths within biotechnology and cybersecurity merge, along with many of their vulnerabilities, and this could spell increased trouble for biodefense, as novel threats can be synthesized and disseminated in ways that fuse the routes of attacks seen in biosecurity and cybersecurity. Herein, we offer an exploration of how threats in the domain of biocybersecurity may emerge through less foreseen routes as it might be an attractive auxiliary to conventional war. This is done through an analysis of potential payload and delivery methods to develop notional threat vectorizations. We conclude with several paradigms through which to view BCS-based threats.
arXiv (Cornell University), Mar 25, 2020
Biocybersecurity is a novel space for the 21st century that meets our innovations in biotechnolog... more Biocybersecurity is a novel space for the 21st century that meets our innovations in biotechnology and computing head on. Within this space, many considerations are open for and demand consideration as groups endeavor to develop products and policies that adequately ensure asset management and protection. Herein, simplified and brief exploration is given followed by some surface discussion of impacts. These impacts concern the end user, ethical and legal considerations, international proceedings, business, and limitations. It is hoped that this will be helpful in future considerations towards biocybersecurity policy developments and implementations.
Bioenergetic functions are routinely evaluated with polarographic systems. Besides polarographic ... more Bioenergetic functions are routinely evaluated with polarographic systems. Besides polarographic systems with data acquisition, visualization and processing tools, other extant systems without these integrated features are still commonly used- however they require cumbersome operations and calculations to derive respiration rates, respiratory control and ADP/O ratios. Even when the signal is digitized, the system requires filter processing and analysis to determine whether large or unnecessary amounts of data have been recorded. A GUI (graphical user interface) was developed in Matlab to integrate digitization, visualization and processing of bioenergetics data measured with a biological oxygen monitor (YSI 5300) via a Clark electrode. The integrated system allows for calibrating, recording and visualizing the signal in real time- as well as determining respiratory rates, respiratory control, and ADP/O ratios. The GUI uses an algorithm to denoise the data collected during the experimental protocol. The use of this denoising procedure allows for a reduction in the sampling rate without compromising the accuracy in calculating the state 3 and 4 respiratory rates. The state 4 respiration rate relative error was the most sensitive in comparison to the other respiration rates errors to changes of the sampling rate. The relative error of the respiration rates, RCR and ADP/O ratio was lower than 0.5% even at low sampling rates (20Hz). The integrated tools of the GUI allow to a user to: a) overcome the typical limitations related to data processing and storage of polarographic system without a digitized component; b) analyze data in comma separated values (csv) format obtained with other digitized systems.https://digitalcommons.odu.edu/engineering_batten/1013/thumbnail.jp
Advances in intelligent systems and computing, Jun 24, 2018
Graphical authentication schemes offer a more memorable alternative to conventional passwords. On... more Graphical authentication schemes offer a more memorable alternative to conventional passwords. One common criticism of graphical passcodes is the risk for observability by unauthorized onlookers. This type of threat is referred to as an Over-the-Shoulder Attack (OSA). A strategy to prevent casual OSAs is to distort the images, making them difficult for onlookers to recognize. Critically, the distortion should not harm legitimate users’ ability to recognize their passcode images. If designers select the incorrect amount of distortion, the passcode images could become vulnerable to attackers or images could become unrecognizable by users rendering the system useless for authentication. We suggest graphical authentication designers can distort images at brushstroke size 10 for a 112 × 90-pixel image to maintain user recognition and decrease casual OSAs. Also, we present mathematical equations to explicitly communicate the image distortion process to facilitate implementation of this OSA resistant approach.
International Journal of Emerging Technologies in Learning (iJET)
Higher education institutions (HEIs) are increasingly relying on digital technologies for classro... more Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped into categories with specific ways to protect ICT security. HEIs also implement general security standards and guidelines, such as the ISO 27000-series and Center for Internet Security (CIS) controls, in their framework. Through synthesis and analysis of ICT securit...
European Conference on Cyber Warfare and Security
Prior work has discussed the emerging fields of Biocybersecurity (BCS) and Cyberbiosecurity (CBS)... more Prior work has discussed the emerging fields of Biocybersecurity (BCS) and Cyberbiosecurity (CBS) in multiple forms. These include the definition, mission-awareness, general applications, and policy (Murch et al, 2018; Peccoud et al, 2019; Potter et al, 2020). One area that has received relatively little attention are unique BCS/CBS vulnerabilities with maritime theaters, which refers to ocean and littoral-based commercial and military ventures. There is considerable ground for both bioeconomies and militaries to be placed at risk of degraded capacity for activity due to maritime-specific BCS/CBS attacks presently in the future. This is especially the case where aforementioned vulnerabilities are used to disrupt logistics through targeting of personnel and means of transport. This paper discusses the growing relevance of CBS/BCS in maritime space, aspects of maritime environments that can be exploited for BCS attacks, possible BCS/CBS attacks in the near future, possible BCS/CBS mea...
European Conference on Cyber Warfare and Security
Verification is central to any process in a functional and enduring cyber-secure organization. Th... more Verification is central to any process in a functional and enduring cyber-secure organization. This verification ishow the validity or accuracy of a state of being is assessed (Schlick, 1936; Balci, 1998). Conversely, breakdownin verification procedures is core to the interruption of normal operations for an organization. A key problemfor organizations that utilize biology as an interlock within their systems is that personnel lack sufficient abilityto verify all practically relevant biological information for procedures such as a nurse logging a blood draw, or amolecular biology technician preparing agar to culture microbes for study. This has several implications, one ofwhich is our diminished ability to approximate and defend against emerging biologically-linked cyberthreats.These could be in the form of mis- or dis-information, contaminants, or calculated threats to vital supplies.Two important questions to ask are: “What may be the implications of diminished ability to undergo ...
International Journal of Emerging Technologies in Learning (ijet), Aug 15, 2023
Higher education institutions (HEIs) are increasingly relying on digital technologies for classro... more Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs' security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped into categories with specific ways to protect ICT security. HEIs also implement general security standards and guidelines, such as the ISO 27000-series and Center for Internet Security (CIS) controls, in their framework. Through synthesis and analysis of ICT security tools and techniques among HEIs, this critical review hopes to provide research directions on IT governance that academic and technical administrators can further explore to secure their information resources.
International Journal of System of Systems Engineering
IoT
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclu... more The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of attacks are possible. To understand the risks in this new landscape, it is important to understand the architecture of IoTHDs, operations, and the social dynamics that may govern their interactions. This paper aims to document and create a map regarding IoTHDs, lay the groundwork for better understanding security risks in emerging IoTHD modalities through a multi-...
International Conference on Cyber Warfare and Security
Exploits of technology have been an issue in healthcare for many years. Many hospital systems hav... more Exploits of technology have been an issue in healthcare for many years. Many hospital systems have a problemwith “disruptive innovation” when introducing new technology. Disruptive innovation is “an innovation thatcreates a new market by applying a different set of values, which ultimately overtakes an existing market”(Sensmeier, 2012). Modern healthcare systems are historically slow to accept new technological advancements .This may be because patient-based, provider-based, or industry-wide decisions are tough to implement, giving wayto dire consequences. One potential consequence is that healthcare providers may not be able to provide the bestpossible care to patients. For example, if a healthcare provider does not adopt new technologies or approaches tomedical treatment, they may not be able to offer the same level of care as a provider who has embraced thoseinnovations. This leads to lower quality of care and poorer patient outcomes.Another consequence is that healthcare provide...
International Conference on Cyber Warfare and Security
The world is currently undergoing a rapid digital transformation sometimes referred to as the fou... more The world is currently undergoing a rapid digital transformation sometimes referred to as the fourth industrial revolution. During this transformation, it is increasingly clear that many scientific fields are not prepared for this change. One specific area is agriculture. As the sector which creates global food supply, this critical infrastructure requires detailed assessment and research via newly developed technologies (Millett et al, 2019; Peccoud et al, 2018) . Despite its fundamental significance to modern civilization, many aspects of industrial agriculture have not yet adapted to the digital world. This is evident in the many vulnerabilities currently present within agricultural systems, as well as the lacking and fragmented nature of policy dictating cybersecurity stances– the field which intersects both cybersecurity and biosecurity to protect several areas within life sciences (Murch et al, 2018; Duncan et al, 2019; U.S. Department of Agriculture, 2022) . These looming ove...
arXiv (Cornell University), Apr 17, 2020
Within the field of biocybersecurity, it is important to understand what vulnerabilities may be u... more Within the field of biocybersecurity, it is important to understand what vulnerabilities may be uncovered in the processing of biologics as well as how they can be safeguarded as they intersect with cyber and cyber-physical systems, as noted by the Peccoud Lab, to ensure not only product and brand integrity, but protect those served. Recent findings have revealed that biological systems can be used to compromise computer systems and vice versa. While regular and sophisticated attacks are still years away, time is of the essence to better understand ways to deepen critique and grasp intersectional vulnerabilities within bioprocessing as processes involved become increasingly digitally accessible. Wargames have been shown to be successful within improving group dynamics in response to anticipated cyber threats, and they can be used towards addressing possible threats within biocybersecurity. Within this paper, we discuss the growing prominence of biocybersecurity, the importance of biocybersecurity to bioprocessing , with respect to domestic and international contexts, and reasons for emphasizing the biological component in the face of explosive growth in biotechnology and thus separating the terms biocybersecurity and cyberbiosecurity. Additionally, a discussion and manual is provided for a simulation towards organizational learning to sense and shore up vulnerabilities that may emerge within an organization's bioprocessing pipeline
Proceedings of the Future Technologies Conference (FTC) 2023, Volume 4
International journal of cyber warfare and terrorism, Jul 1, 2021
The evolving nature of warfare has been changing with cybersecurity and the use of advanced biote... more The evolving nature of warfare has been changing with cybersecurity and the use of advanced biotechnologyineachaspectofthesocietyisexpandingandoverlappingwiththecyberworld.This intersection, which has been described as "biocybersecurity" (BCS), can become a major front ofthe21st-centuryconflicts.TherearethreelinesofBCSwhichmakeitacriticalcomponentof overallcybersecurity:(1)cyberoperationswithintheareaofBCShavelifethreateningconsequences toagreaterextentthanothercyberoperations,(2)thebreachinhealth-relatedpersonaldataisa significanttoolforfatalattacks,and(3)health-relatedmisinformationcampaignsasacomponent ofBCScancausesignificantdamagecomparedtoothermisinformationcampaigns.Basedonthe observationthatratherthaninitiatingthenecessarycooperationCOVID-19helpedexacerbatethe existingconflicts,theauthorssuggestthatBCSneedstobeconsideredasanessentialcomponent ofthecyberdoctrine,withintheDefendingForwardframework.Thefindingsareexpectedtohelp futurecyberpolicydevelopments.
Springer eBooks, Oct 25, 2021
Nano-Pulse Stimulation (NPS), a pulsed power-derived technology, stimulates structural and functi... more Nano-Pulse Stimulation (NPS), a pulsed power-derived technology, stimulates structural and functional changes in plasma membranes and cellular organelles. NPS induces a Ca 2+ influx and opening of the mitochondrial permeability transition pore (mPTP) that dissipates the mitochondrial membrane potential (ΔΨ m) and, when sustained, induces regulated cell death. Here we show that in rat cardiomyoblasts (H9C2) cyclophilin D (CypD) is a mitochondrial sensor for NPS as defined by observations that loss of ΔΨ m is Ca 2+ and mitochondrial reactive oxygen species (mROS) dependent and cyclosporin A (CsA)-sensitive, which are diagnostic qualities for effects on CypD and the mPTP. Mechanistically, NPS stimulates increases in intracellular Ca 2+ which enhances mROS in a dose dependent manner. The regulatory role of CypD on mPTP activation, is effectively inhibited at low Ca 2+ concentrations and/or by CsA. Although NPS-induced dissipation of ΔΨ m is largely Ca 2+dependent, the degree of Ca 2+ sensitivities vary among cell types. Nevertheless, knockdown of the proapoptotic protein, APAF-1, and overexpression of the antiapoptotic protein, Bcl-xl, in human Jurkat T lymphocytes (E6.1) did not affect NPS-induced dissipation of ΔΨ m or cell death. Taken together, these results indicate NPS induces activation of the mPTP through Ca 2+-dependent, mROS-dependent, CsA-sensitive dissipation of the ΔΨ m that is independent of caspase activation and insensitive to protection by Bcl-xl.
arXiv (Cornell University), Oct 1, 2020
Biodefense is the discipline of ensuring biosecurity with respect to select groups of organisms a... more Biodefense is the discipline of ensuring biosecurity with respect to select groups of organisms and limiting their spread. This field has increasingly been challenged by novel threats from nature that have been weaponized such as SARS, Anthrax, and similar pathogens, but has emerged victorious through collaboration of national and world health groups. However, it may come under additional stress in the 21st century as the field intersects with the cyberworld-a world where governments have already been struggling to keep up with cyber attacks from small to state-level actors as cyberthreats have been relied on to level the playing field in international disputes. Disruptions to military logistics and economies through cyberattacks have been able to be done at a mere fraction of economic and moral costs through conventional military means, making it an increasingly tempting means of disruption. In the field of biocybersecurity (BCS), the strengths within biotechnology and cybersecurity merge, along with many of their vulnerabilities, and this could spell increased trouble for biodefense, as novel threats can be synthesized and disseminated in ways that fuse the routes of attacks seen in biosecurity and cybersecurity. Herein, we offer an exploration of how threats in the domain of biocybersecurity may emerge through less foreseen routes as it might be an attractive auxiliary to conventional war. This is done through an analysis of potential payload and delivery methods to develop notional threat vectorizations. We conclude with several paradigms through which to view BCS-based threats.
arXiv (Cornell University), Mar 25, 2020
Biocybersecurity is a novel space for the 21st century that meets our innovations in biotechnolog... more Biocybersecurity is a novel space for the 21st century that meets our innovations in biotechnology and computing head on. Within this space, many considerations are open for and demand consideration as groups endeavor to develop products and policies that adequately ensure asset management and protection. Herein, simplified and brief exploration is given followed by some surface discussion of impacts. These impacts concern the end user, ethical and legal considerations, international proceedings, business, and limitations. It is hoped that this will be helpful in future considerations towards biocybersecurity policy developments and implementations.
Bioenergetic functions are routinely evaluated with polarographic systems. Besides polarographic ... more Bioenergetic functions are routinely evaluated with polarographic systems. Besides polarographic systems with data acquisition, visualization and processing tools, other extant systems without these integrated features are still commonly used- however they require cumbersome operations and calculations to derive respiration rates, respiratory control and ADP/O ratios. Even when the signal is digitized, the system requires filter processing and analysis to determine whether large or unnecessary amounts of data have been recorded. A GUI (graphical user interface) was developed in Matlab to integrate digitization, visualization and processing of bioenergetics data measured with a biological oxygen monitor (YSI 5300) via a Clark electrode. The integrated system allows for calibrating, recording and visualizing the signal in real time- as well as determining respiratory rates, respiratory control, and ADP/O ratios. The GUI uses an algorithm to denoise the data collected during the experimental protocol. The use of this denoising procedure allows for a reduction in the sampling rate without compromising the accuracy in calculating the state 3 and 4 respiratory rates. The state 4 respiration rate relative error was the most sensitive in comparison to the other respiration rates errors to changes of the sampling rate. The relative error of the respiration rates, RCR and ADP/O ratio was lower than 0.5% even at low sampling rates (20Hz). The integrated tools of the GUI allow to a user to: a) overcome the typical limitations related to data processing and storage of polarographic system without a digitized component; b) analyze data in comma separated values (csv) format obtained with other digitized systems.https://digitalcommons.odu.edu/engineering_batten/1013/thumbnail.jp
Advances in intelligent systems and computing, Jun 24, 2018
Graphical authentication schemes offer a more memorable alternative to conventional passwords. On... more Graphical authentication schemes offer a more memorable alternative to conventional passwords. One common criticism of graphical passcodes is the risk for observability by unauthorized onlookers. This type of threat is referred to as an Over-the-Shoulder Attack (OSA). A strategy to prevent casual OSAs is to distort the images, making them difficult for onlookers to recognize. Critically, the distortion should not harm legitimate users’ ability to recognize their passcode images. If designers select the incorrect amount of distortion, the passcode images could become vulnerable to attackers or images could become unrecognizable by users rendering the system useless for authentication. We suggest graphical authentication designers can distort images at brushstroke size 10 for a 112 × 90-pixel image to maintain user recognition and decrease casual OSAs. Also, we present mathematical equations to explicitly communicate the image distortion process to facilitate implementation of this OSA resistant approach.
International Journal of Emerging Technologies in Learning (iJET)
Higher education institutions (HEIs) are increasingly relying on digital technologies for classro... more Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped into categories with specific ways to protect ICT security. HEIs also implement general security standards and guidelines, such as the ISO 27000-series and Center for Internet Security (CIS) controls, in their framework. Through synthesis and analysis of ICT securit...
European Conference on Cyber Warfare and Security
Prior work has discussed the emerging fields of Biocybersecurity (BCS) and Cyberbiosecurity (CBS)... more Prior work has discussed the emerging fields of Biocybersecurity (BCS) and Cyberbiosecurity (CBS) in multiple forms. These include the definition, mission-awareness, general applications, and policy (Murch et al, 2018; Peccoud et al, 2019; Potter et al, 2020). One area that has received relatively little attention are unique BCS/CBS vulnerabilities with maritime theaters, which refers to ocean and littoral-based commercial and military ventures. There is considerable ground for both bioeconomies and militaries to be placed at risk of degraded capacity for activity due to maritime-specific BCS/CBS attacks presently in the future. This is especially the case where aforementioned vulnerabilities are used to disrupt logistics through targeting of personnel and means of transport. This paper discusses the growing relevance of CBS/BCS in maritime space, aspects of maritime environments that can be exploited for BCS attacks, possible BCS/CBS attacks in the near future, possible BCS/CBS mea...
European Conference on Cyber Warfare and Security
Verification is central to any process in a functional and enduring cyber-secure organization. Th... more Verification is central to any process in a functional and enduring cyber-secure organization. This verification ishow the validity or accuracy of a state of being is assessed (Schlick, 1936; Balci, 1998). Conversely, breakdownin verification procedures is core to the interruption of normal operations for an organization. A key problemfor organizations that utilize biology as an interlock within their systems is that personnel lack sufficient abilityto verify all practically relevant biological information for procedures such as a nurse logging a blood draw, or amolecular biology technician preparing agar to culture microbes for study. This has several implications, one ofwhich is our diminished ability to approximate and defend against emerging biologically-linked cyberthreats.These could be in the form of mis- or dis-information, contaminants, or calculated threats to vital supplies.Two important questions to ask are: “What may be the implications of diminished ability to undergo ...
International Journal of Emerging Technologies in Learning (ijet), Aug 15, 2023
Higher education institutions (HEIs) are increasingly relying on digital technologies for classro... more Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs' security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped into categories with specific ways to protect ICT security. HEIs also implement general security standards and guidelines, such as the ISO 27000-series and Center for Internet Security (CIS) controls, in their framework. Through synthesis and analysis of ICT security tools and techniques among HEIs, this critical review hopes to provide research directions on IT governance that academic and technical administrators can further explore to secure their information resources.
International Journal of System of Systems Engineering
IoT
The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclu... more The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of attacks are possible. To understand the risks in this new landscape, it is important to understand the architecture of IoTHDs, operations, and the social dynamics that may govern their interactions. This paper aims to document and create a map regarding IoTHDs, lay the groundwork for better understanding security risks in emerging IoTHD modalities through a multi-...
International Conference on Cyber Warfare and Security
Exploits of technology have been an issue in healthcare for many years. Many hospital systems hav... more Exploits of technology have been an issue in healthcare for many years. Many hospital systems have a problemwith “disruptive innovation” when introducing new technology. Disruptive innovation is “an innovation thatcreates a new market by applying a different set of values, which ultimately overtakes an existing market”(Sensmeier, 2012). Modern healthcare systems are historically slow to accept new technological advancements .This may be because patient-based, provider-based, or industry-wide decisions are tough to implement, giving wayto dire consequences. One potential consequence is that healthcare providers may not be able to provide the bestpossible care to patients. For example, if a healthcare provider does not adopt new technologies or approaches tomedical treatment, they may not be able to offer the same level of care as a provider who has embraced thoseinnovations. This leads to lower quality of care and poorer patient outcomes.Another consequence is that healthcare provide...
International Conference on Cyber Warfare and Security
The world is currently undergoing a rapid digital transformation sometimes referred to as the fou... more The world is currently undergoing a rapid digital transformation sometimes referred to as the fourth industrial revolution. During this transformation, it is increasingly clear that many scientific fields are not prepared for this change. One specific area is agriculture. As the sector which creates global food supply, this critical infrastructure requires detailed assessment and research via newly developed technologies (Millett et al, 2019; Peccoud et al, 2018) . Despite its fundamental significance to modern civilization, many aspects of industrial agriculture have not yet adapted to the digital world. This is evident in the many vulnerabilities currently present within agricultural systems, as well as the lacking and fragmented nature of policy dictating cybersecurity stances– the field which intersects both cybersecurity and biosecurity to protect several areas within life sciences (Murch et al, 2018; Duncan et al, 2019; U.S. Department of Agriculture, 2022) . These looming ove...