Skip to main content
Top
Published in:
Cover of the book

2023 | OriginalPaper | Chapter

Data Security as a Top Priority in the Digital World: Preserve Data Value by Being Proactive and Thinking Security First

Author : Anastasija Nikiforova

Published in: Research and Innovation Forum 2022

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Today, large amounts of data are being continuously produced, collected, and exchanged between systems. As the number of devices, systems and data produced grows up, the risk of security breaches increases. This is all the more relevant in times of Covid-19, which has affected not only the health and lives of human beings’ but also the lifestyle of society, i.e. the digital environment has replaced the physical. This has led to an increase in cyber security threats of various nature. While security breaches and different security protection mechanisms have been widely covered in the literature, the concept of a “primitive” artifact such as data management system seems to have been more neglected by researchers and practitioners. But are data management systems always protected by default? Previous research and regular updates on data leakages suggest that the number and nature of these vulnerabilities are high. It also refers to little or no DBMS protection, especially in case of NoSQL, which are thus vulnerable to attacks. The aim of this paper is to examine whether “traditional” vulnerability registries provide a sufficiently comprehensive view of DBMS security, or they should be intensively and dynamically inspected by DBMS owners by referring to Internet of Things Search Engines moving towards a sustainable and resilient digitized environment. The paper brings attention to this problem and makes the reader think about data security before looking for and introducing more advanced security and protection mechanisms, which, in the absence of the above, may bring no value.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Pevnev, V., Kapchynskyi, S.: Database security: threats and preventive measures (2018) Pevnev, V., Kapchynskyi, S.: Database security: threats and preventive measures (2018)
2.
go back to reference Himeur, Y., Sohail, S. S., Bensaali, F., Amira, A., Alazab, M.: Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives. Comput. Secur. 102746 (2022) Himeur, Y., Sohail, S. S., Bensaali, F., Amira, A., Alazab, M.: Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives. Comput. Secur. 102746 (2022)
3.
go back to reference Lallie, H.S., Shepherd, L.A., Nurse, J.R., Erola, A., Epiphaniou, G., Maple, C., Bellekens, X.: Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102248 (2021)CrossRef Lallie, H.S., Shepherd, L.A., Nurse, J.R., Erola, A., Epiphaniou, G., Maple, C., Bellekens, X.: Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102248 (2021)CrossRef
5.
go back to reference Risk Based Security and Flashpoint 2021. Year end report vulnerability quickview (2021) Risk Based Security and Flashpoint 2021. Year end report vulnerability quickview (2021)
9.
go back to reference Daskevics, A., Nikiforova, A.: ShoBeVODSDT: Shodan and binary edge based vulnerable open data sources detection tool or what Internet of Things Search Engines know about you. In: 2021 Second International Conference on Intelligent Data Science Technologies and Applications (IDSTA), pp. 38–45. IEEE (2021) Daskevics, A., Nikiforova, A.: ShoBeVODSDT: Shodan and binary edge based vulnerable open data sources detection tool or what Internet of Things Search Engines know about you. In: 2021 Second International Conference on Intelligent Data Science Technologies and Applications (IDSTA), pp. 38–45. IEEE (2021)
10.
go back to reference Li, L., Qian, K., Chen, Q., Hasan, R., Shao, G.:. Developing hands-on labware for emerging database security. In: Proceedings of the 17th Annual Conference on Information Technology Education, pp. 60–64 (2016) Li, L., Qian, K., Chen, Q., Hasan, R., Shao, G.:. Developing hands-on labware for emerging database security. In: Proceedings of the 17th Annual Conference on Information Technology Education, pp. 60–64 (2016)
11.
go back to reference Fahd, K., Venkatraman, S., Hammeed, F.K.: A comparative study of NoSQL system vulnerabilities with big data. Int. J. Manage. Inf. Tech 11(4), 1–19 (2019) Fahd, K., Venkatraman, S., Hammeed, F.K.: A comparative study of NoSQL system vulnerabilities with big data. Int. J. Manage. Inf. Tech 11(4), 1–19 (2019)
14.
go back to reference Ferrari, D., Carminati, M., Polino, M., Zanero, S.: NoSQL breakdown: a large-scale analysis of misconfigured NoSQL services. In: Annual Computer Security Applications Conference, pp. 567–581 (2020) Ferrari, D., Carminati, M., Polino, M., Zanero, S.: NoSQL breakdown: a large-scale analysis of misconfigured NoSQL services. In: Annual Computer Security Applications Conference, pp. 567–581 (2020)
15.
go back to reference Teimoor, R.A.: A review of database security concepts, risks, and problems. UHD J. Sci. Technol. 5(2), 38–46 (2021)CrossRef Teimoor, R.A.: A review of database security concepts, risks, and problems. UHD J. Sci. Technol. 5(2), 38–46 (2021)CrossRef
16.
go back to reference Malik, M., Patel, T.: Database security-attacks and control methods. Int.J. Inf. 6(1/2), 175–183 (2016) Malik, M., Patel, T.: Database security-attacks and control methods. Int.J. Inf. 6(1/2), 175–183 (2016)
Metadata
Title
Data Security as a Top Priority in the Digital World: Preserve Data Value by Being Proactive and Thinking Security First
Author
Anastasija Nikiforova
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-19560-0_1

Premium Partner