InnoHEALTH magazine Volume 3 issue 3 | Seite 50

causing capital, labor loss or can be used in act of terrorism for uncontrolled production of toxins or infectious agents. To mitigate these risks, the culture of the life sciences community needs to shift from trusting blindly to a highly aware and trained community. This also requires intricate relationships between the computational and experimental dimensions of product development workflows. The diverse nature of pathogens and toxins with their potential to be used as biowarfare agent (BW) could be attributed to multiple factors. These include infectivity (the number of organisms required to cause disease), virulence (the severity of the 50 Volume 3 | Issue 3 | July-September 2018 disease caused), transmissibility (ease of spreading from person to person), and incubation period (the time from exposure of a biological agent to the onset of illness). All these attributes are manageable by modern biotechnology and information related to such experimentation trials is key to any covert attack using these for BW. Similarly, in cyber world there is a diversity of malicious codes. These include viruses (programs that replicate in target machinery); worms (self-sustaining programs) and carriers such as trojan horse to perform a legitimate function with malicious activity. Additionally, Botnets, or networks of computers infected with malicious code, can be coordinated to perform distributed denial of service attacks. For biological weapons, delivery vehicles range from advanced aerial spray technology to contamination of food products or water, while malicious code in cyberspace can be delivered by usage portals, email, web browsers, chat clients, web- enabled applications and updates. The cyber threat has expanded dramatically in recent years with a series of damage. Terrorists are using cyber capabilities over traditional methods to target 104 countries including India. Governments and security experts have singled out the life sciences sector as being significantly vulnerable to cybercrime. In cyber security terms, innovation is fast