Biomedical defense principles to counter DNA deep hacking. (2023)
- Record Type:
- Book
- Title:
- Biomedical defense principles to counter DNA deep hacking. (2023)
- Main Title:
- Biomedical defense principles to counter DNA deep hacking
- Further Information:
- Note: Rocky Termanini.
- Authors:
- Termanini, Rocky
- Contents:
- 1. Structure of DNA and the landscape of DNA Deep Hacking (DDH); 2. History of bio-hackers, psychological profiling and fingerprinting of the bio-hacker. The story the recent North Korean WannaCry ransomware attack; 3. Code injection and the E. Coli story as the carrier of malware DNA code; 4. CRISPR the magical knife. The anatomy and mechanics. The good, the bad and the ugly; 5. The Genome vandalism. "When ISIS Meets CRISPR" the blueprint from Hell. Generating DNA sequence from payload binary code; 6. Synthesis of DNA with encoded malicious code. The E. Coli Plasmids story; 7. Third party role of the Dark Web and the Deep Web, The Onion Router (TOR); 8. How to select a target. Planning the bio-attack, damage, and vulnerability of the attack; 9. The Drone technology, Transport strategy and risk evaluation; 10. Drone delivery methods, how to communicate with the destination; 11. The Bio-Stuxnet malicious DNA attack. Attack simulation and review results; 12. Translation and storage of the DNA contaminated code; 13. Encryption technology and camouflaging contaminated DNA-code injection; 14. Detection of surprise bio-attack, the bio-response, response of Government agencies. DNA bio-defense. Attack forecast and eradication, security measure to protect the DNA data files; 15. Reverse Engineering technology; 16. The controversy of CRISPR with religion and ethics advocates to control evolution and embryology enhancement, and elimination of genetically inherited diseases; Appendix;1. Structure of DNA and the landscape of DNA Deep Hacking (DDH); 2. History of bio-hackers, psychological profiling and fingerprinting of the bio-hacker. The story the recent North Korean WannaCry ransomware attack; 3. Code injection and the E. Coli story as the carrier of malware DNA code; 4. CRISPR the magical knife. The anatomy and mechanics. The good, the bad and the ugly; 5. The Genome vandalism. "When ISIS Meets CRISPR" the blueprint from Hell. Generating DNA sequence from payload binary code; 6. Synthesis of DNA with encoded malicious code. The E. Coli Plasmids story; 7. Third party role of the Dark Web and the Deep Web, The Onion Router (TOR); 8. How to select a target. Planning the bio-attack, damage, and vulnerability of the attack; 9. The Drone technology, Transport strategy and risk evaluation; 10. Drone delivery methods, how to communicate with the destination; 11. The Bio-Stuxnet malicious DNA attack. Attack simulation and review results; 12. Translation and storage of the DNA contaminated code; 13. Encryption technology and camouflaging contaminated DNA-code injection; 14. Detection of surprise bio-attack, the bio-response, response of Government agencies. DNA bio-defense. Attack forecast and eradication, security measure to protect the DNA data files; 15. Reverse Engineering technology; 16. The controversy of CRISPR with religion and ethics advocates to control evolution and embryology enhancement, and elimination of genetically inherited diseases; Appendix; Epilogue … (more)
- Publisher Details:
- Amsterdam : Academic Press
- Publication Date:
- 2023
- Extent:
- 1 online resource, illustrations (black and white, and colour)
- Subjects:
- 610.28558
Medical informatics -- Security measures
DNA data banks -- Security measures - Languages:
- English
- ISBNs:
- 9780323985406
- Related ISBNs:
- 9780323999144
- Notes:
- Note: Description based on CIP data; resource not viewed.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.740297
- Ingest File:
- 15_021.xml