Data security as a top priority in the digital world: preserve data value by being proactive and thinking security first

06/14/2022
by   Anastasija Nikiforova, et al.
0

Today, large amounts of data are being continuously produced, collected, and exchanged between systems. As the number of devices, systems and data produced grows up, the risk of security breaches increases. This is all the more relevant in times of COVID-19, which has affected not only the health and lives of human beings' but also the lifestyle of society, i.e., the digital environment has replaced the physical. This has led to an increase in cyber security threats of various nature. While security breaches and different security protection mechanisms have been widely covered in the literature, the concept of a primitive artifact such as data management system seems to have been more neglected by researchers and practitioners. But are data management systems always protected by default? Previous research and regular updates on data leakages suggest that the number and nature of these vulnerabilities are high. It also refers to little or no DBMS protection, especially in case of NoSQL, which are thus vulnerable to attacks. The aim of this paper is to examine whether traditional vulnerability registries provide a sufficiently comprehensive view of DBMS security, or they should be intensively and dynamically inspected by DBMS owners by referring to Internet of Things Search Engines moving towards a sustainable and resilient digitized environment. The paper brings attention to this problem and makes the reader think about data security before looking for and introducing more advanced security and protection mechanisms, which, in the absence of the above, may bring no value.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/23/2022

NoSQL security: can my data-driven decision-making be affected from outside?

Nowadays, there are billions interconnected devices forming Cyber-Physic...
research
05/31/2021

GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security

Internet-of-Things (IoT) and cyber-physical systems (CPSs) may consist o...
research
12/16/2019

A Secure Authentication Technique in Internet of Medical Things through Machine Learning

The rapid growth of the Internet of Things technology in healthcare doma...
research
02/01/2021

Using a Cyber Digital Twin for Continuous Automotive Security Requirements Verification

A Digital Twin (DT) is a digital representation of a physical object use...
research
11/14/2020

Software Protection as a Risk Analysis Process

The last years have seen an increase of Man-at-the-End (MATE) attacks ag...
research
07/13/2021

Security and Privacy of Wireless Beacon Systems

Bluetooth Low Energy (BLE) beacons have been increasingly used in smart ...
research
05/22/2019

Simulation-Based Cyber Data Collection Efficacy

Building upon previous research in honeynets and simulations, we present...

Please sign up or login with your details

Forgot password? Click here to reset