Ciberbiosegurança em ambientes biointeligentes: Integração de inteligência artificial, biologia sintética e automação em setores vitais

Autores

DOI:

https://doi.org/10.33448/rsd-v14i6.48937

Palavras-chave:

Ciberbiosegurança, Biotecnologia, Segurança cibernética, Inteligência artificial, Biologia sintética.

Resumo

O presente estudo visa analisar a importância da cibersegurança no contexto dos sistemas relacionados às ciências biológicas em diferentes setores da economia, a qual é denominada de ciberbiosegurança. Realizou-se uma pesquisa bibliográfica narrativa. A inovação tecnológica tornou-se um aspecto inerente à existência de nossa sociedade, uma vez que praticamente todos os itens relevantes para nossa vida diária possuem pelo menos um componente cibernético associado a ela. Dentre estes, podemos ressaltar os computadores pessoais, as redes de computadores, a tecnologia da informação e a realidade virtual. Agora, as ciências da vida vêm estabelecendo uma interface com a tecnologia da informação e a segurança cibernética. Esta convergência resultou em um crescimento significativo do setor de biotecnologia e suas aplicações na saúde, agricultura, manufatura, automação, inteligência artificial e biologia sintética. Com isso, fez-se necessário a criação de uma disciplina que englobasse a biossegurança e a segurança ciberfísica e cibersegurança, a qual foi denominada de ciberbiosegurança. Esta envolve a compreensão, proteção, mitigação, investigação e atribuição de vigilância indesejada, intrusões e atividades maliciosas e prejudiciais que podem ocorrer dentro ou nas interfaces das ciências médicas e da vida, que afetam a segurança, a competitividade e a resiliência.

Referências

Arshad, S., Arshad, J., Khan, M. M., & Parkinson, S. (2021). Analysis of security and privacy challenges for DNA-genomics applications and databases. Journal of biomedical informatics, 119, 103815. https://doi.org/10.1016/j.jbi.2021.103815

Carman, A. (2014). Dragonfly Malware was Designed to Target Pharmaceutical Companies. SC Magazine. Available online at: https://www.scmagazine.com/home/security-news/dragonfly-malware-was-designed-to-target-pharmaceutical-companies/ (accessed August 11, 2019).

Casarin, S. T. et al. (2020). Tipos de revisão de literatura: considerações das editoras do Journal of Nursing and Health/Types of literature review: considerations of the editors of the Journal of Nursing and Health. Journal of Nursing and Health,10(5). DOI: https://doi.org/10.15210/jonah.v10i5.19924. https://periodicos.ufpel.edu.br/index.php/enfermagem/article/view/19924.

Chakravarthi, P. G.; Rambabu V; Ramamurty DSVNM; Rahul G. & Prasad SVGVA. AI and Machine Learning in Biotechnology: A Paradigm Shift in Biochemical Innovation. International Journal of Plant, Animal and Environmental Sciences. 14(2024), 70-80. DOI: 10.26502/ijpaes.4490166

Chi, H., Welch, S., Vasserman, E., & Kalaimannan, E. (2017). “A Framework of Cybersecurity Approaches in Precision Agriculture. in” proceedings of the ICMLG2017 5th International Conference on Management Leadership and Governance, Dayton, USA, 2–3 March, 2017. Reading, UK: Academic Conferences and Publishing Limited, 90–95.

Cuningkin, V., Riley, E., & Rainey, L. (2021). Preventing Medjacking. The American journal of nursing, 121(10), 46–50. https://doi.org/10.1097/01.NAJ.0000794252.99183.5e

Duncan, S. E., Reinhard, R., Williams, R. C., Ramsey, F., Thomason, W., Lee, K. & Dudek, N., Mostaghimi, S., Colbert, E., & Murch, R. (2019). Ciberbiossegurança: uma nova perspectiva sobre a proteção do sistema alimentar e agrícola dos EUA. Fronteiras em bioengenharia e biotecnologia, 7, 63. https://doi.org/10.3389/fbioe.2019.00063

Emergen Research (2020). Smart Farming Market by Farming Type (Livestock Monitoring, Precision Farming, Others), by Offerings (Software, Hardware, Others), and by Application (Livestock Monitoring Application, Precision Farming Application, Others), Forecasts to 2027. Available at: https://www.emergenresearch.com/industry-report/smart-farming-market

Geil A., Sagers G., Spaulding A. D., & Wolf J. R. (2018). Cyber Security on the Farm: an Assessment of Cyber Security Practices in the United States Agriculture Industry. Int. Food Agribusiness Manage. Rev. 21 (1030-2018-1811), 317–334. 10.22434/ifamr2017.0045

Gibson, D. G., Glass, J. I., Lartigue, C., Noskov, V. N., Chuang, R. Y., Algire, M. A., Benders, G. A., Montague, M. G., Ma, L., Moodie, M. M., Merryman, C., Vashee, S., Krishnakumar, R., Assad-Garcia, N., Andrews-Pfannkoch, C., Denisova, E. A., Young, L., Qi, Z. Q., Segall-Shapiro, T. H., Calvey, C. H. & Venter, J. C. (2010). Creation of a bacterial cell controlled by a chemically synthesized genome. Science (New York, N.Y.), 329(5987), 52–56. https://doi.org/10.1126/science.1190719

Helu, M., & Hedberg, T., Jr (2015). Enabling Smart Manufacturing Research and Development using a Product Lifecycle Test Bed. Procedia manufacturing, 1, 86–97. https://doi.org/10.1016/j.promfg.2015.09.066

Jalali, M. S., Landman, A., & Gordon, W. J. (2021). Telemedicine, privacy, and information security in the age of COVID-19. Journal of the American Medical Informatics Association: JAMIA, 28(3), 671–672. https://doi.org/10.1093/jamia/ocaa310

Khera, M. (2017). Think Like a Biohacker. Journal of diabetes science and technology, 11(2), 207–212. https://doi.org/10.1177/1932296816677576

Kiss, A. A., Grievink, J. & Rito-Palomares, M. (2014). A systems engineering perspective on process integration in industrial biotechnology. J. Chem. Tech. Biotech. 90, 349–355. 10.1002/jctb.4584

Mazzeo, A & Santos, E J C. (2025a). Integrating Cybersecurity into Veterinary Medicine: Protecting Animal Health Data and Systems. Research, Society and Development, 14(5), e7414547190. https://doi.org/10.33448/rsd-v14i5.47190

Mazzeo, A & Santos, E J C. (2025b). Integration of biomedical devices and the internet of bodies revolution. Research, Society and Development, 14(5), e11814548921. https://doi.org/10.33448/rsd-v14i5.48921

McCulloch, W.S. & Pitts, W. (1943). A logical calculus of the ideas immanent in nervous activity. Bulletin of Mathematical Biophysics 5, 115–133 (1943). https://doi.org/10.1007/BF02478259

Mendes, C. (2022). O que é uma revisão narrativa de literatura: exemplos e considerações da metodologia. https://www.youtube.com/watch?v=YlBWSVsxvRM

Morag, N. (2014). Cybercrime, Cyberespionage, and Cybersabotage: Understanding Emerging Threats. Colorado Technical University: College of Security Studies. Available online at: https://www.coloradotech.edu/media/default/CTU/documents/resources/cybercrime-white-paper.pdf (accessed August 11, 2019).

Murch, R. S., So, W. K., Buchholz, W. G., Raman, S., & Peccoud, J. (2018). Cyberbiosecurity: An Emerging New Discipline to Help Safeguard the Bioeconomy. Frontiers in bioengineering and biotechnology, 6, 39. https://doi.org/10.3389/fbioe.2018.00039

Murch, R., & DiEuliis, D. (2019). Editorial: Mapping the Cyberbiosecurity Enterprise. Frontiers in bioengineering and biotechnology, 7, 235. https://doi.org/10.3389/fbioe.2019.00235

Nayak, J., Meher, S. K., Souri, A., Naik, B., & Vimal, S. (2022). Extreme learning machine and bayesian optimization-driven intelligent framework for IoMT cyber-attack detection. The Journal of supercomputing, 78(13), 14866–14891. https://doi.org/10.1007/s11227-022-04453-z

Nielsen, J., & Keasling, J. D. (2011). Synergies between synthetic biology and metabolic engineering. Nature biotechnology, 29(8), 693–695. https://doi.org/10.1038/nbt.1937

Osborne, C. (2018). US Hospital Pays $55,000 to Biohackers After Ransomware Attack. ZDNet. Available online at: https://www.zdnet.com/article/us-hospital-pays-55000-to-ransomware-operators/ (accessed August 11, 2019).

Peccoud, J., Gallegos, J. E., Murch, R., Buchholz, W. G., & Raman, S. (2018). Cyberbiosecurity: From Naive Trust to Risk Awareness. Trends in biotechnology, 36(1), 4–7. https://doi.org/10.1016/j.tibtech.2017.10.012

Pereira, A. S. et al. (2018). Metodologia da pesquisa científica. [free ebook]. Santa Maria: Ed. UFSM.

Pinkham, D. W., Sala, I. M., Soisson, E. T., Wang, B., & Deeley, M. A. (2021). Are you ready for a cyberattack?. Journal of applied clinical medical physics, 22(10), 4–7. https://doi.org/10.1002/acm2.13422

Purnick, P. E., & Weiss, R. (2009). The second wave of synthetic biology: from modules to systems. Nature reviews. Molecular cell biology, 10(6), 410–422. https://doi.org/10.1038/nrm2698

Richardson, L. C., Lewis, S. M., & Burnette, R. N. (2019). Building Capacity for Cyberbiosecurity Training. Frontiers in bioengineering and biotechnology, 7, 112. https://doi.org/10.3389/fbioe.2019.00112

Rollin, J. A., Tam, T. K. & Zhang, Y. H. P. (2013). New biotechnology paradigm: cell-free biosystems for biomanufacturing. Green Chem. 15, 1708–1719. 10.1039/c3gc40625c

Rother, E. T. (2007). Revisão sistemática x revisão narrativa. Acta paul. enferm. 20 (2). https://doi.org/10.1590/S0103-21002007000200001.

Shannon, C. E. (1950). A Chess-Playing Machine. Scientific American, 182(2), 48–51. DOI:10.1007/978-1-4613-8716-9_6

Snyder, H. (2019). Literature review as a research methodology: An overview and guidelines. Journal of business research, 104, 333-339.

Sousa, A. S.; Oliveira, G. S.; & Alves, L. H (2021). A pesquisa bibliográfica: princípios e fundamentos. Cadernos da Fucamp, 20(43). https://revistas.fucamp.edu.br/index.php/cadernos/article/view/2336

Sykuta, M. E. (2016). Big data in agriculture: property rights, privacy and competition in ag data services. Internat. Food Agribusiness Manage. Rev. 19, 57–74.

Toosi, A., Bottino, A., Saboury, B. & Rahmim, A. (2021) A brief history ofAI: how to prevent another winter (a critical review). PET Clin.https://doi.org/10.1016/j.cpet.2021.07.001

Van der Linden, D., Michalec, O. A. & Zamansky, A. (2020). Cybersecurity for Smart Farming: Socio-Cultural Context Matters. IEEE Technol. Soc. Mag. 39 (4), 28–35. 10.1109/mts.2020.3031844

Verseux, C. N., Paulino-Lima, I. G., Baqué, M., Billi, D. & Rothschild, L. J. (2016). Synthetic Biology for Space Exploration: Promises and Societal Implications. In: Hagen, K., Engelhard, M., Toepfer, G. (eds) Ambivalences of Creating Life. Ethics of Science and Technology Assessment, vol 45. Springer, Cham. https://doi.org/10.1007/978-3-319-21088-9_4

Wang, T., Tu, M., Lyu, H., Li, Y., Orfila, O., Zou, G., & Gruyer, D. (2022). Impact Evaluation of Cyberattacks on Connected and Automated Vehicles in Mixed Traffic Flow and Its Resilient and Robust Control Strategy. Sensors (Basel, Switzerland), 23(1), 74. https://doi.org/10.3390/s23010074

You, E., & Kozminski, K. G. (2015). Biosecurity in the age of Big Data: a conversation with the FBI. Molecular biology of the cell, 26(22), 3894–3897. https://doi.org/10.1091/mbc.E14-01-0027

Zhong, R. Y., Xu, X., Klotz, E. & Newman, S. T. (2017). Intelligent manufacturing in the context of industry 4.0: A review. Engineering 3, 616–630. 10.1016/J.ENG.2017.05.015

Downloads

Publicado

2025-06-15

Edição

Seção

Ciências da Saúde

Como Citar

Ciberbiosegurança em ambientes biointeligentes: Integração de inteligência artificial, biologia sintética e automação em setores vitais. Research, Society and Development, [S. l.], v. 14, n. 6, p. e5714648937, 2025. DOI: 10.33448/rsd-v14i6.48937. Disponível em: https://rsdjournal.org/rsd/article/view/48937. Acesso em: 5 dez. 2025.