We take another look at the security of biological data, this time through the eyes of Berger and Schneck, and the discussion of major players such as China. The authors first introduce advances in biotechnology and benefits and challenges that arise from it today, including exploitation of the resulting data "by state actors, malicious nonstate actors, and hackers." They then discuss common approaches used to protect this soft of data, as well as the various vulnerabilities that come from (or from the lack of) those approaches. The authors close their paper by offering four specific strategies "toward protecting biological data from unauthorized acquisition and use, enhancing efforts to preserve data integrity and provenance, and enabling future benefit of biotechnological advances."
This is a Columbia University-created course that is released on the edX platform. The self-paced five-week course is designed to help learners "develop a basic understanding of the principles of machine learning and derive practical solutions using predictive analytics." The course is free to take.
This self-paced four-week University of Washington course is designed to help learners "gain an overview of the cybersecurity landscape as well as national (USA) and international perspectives on the field." The course is free to take and requires on average two to five hours a week of effort.