Skip to main content

Data Security as a Top Priority in the Digital World: Preserve Data Value by Being Proactive and Thinking Security First

  • Conference paper
  • First Online:

Part of the book series: Springer Proceedings in Complexity ((SPCOM))

Abstract

Today, large amounts of data are being continuously produced, collected, and exchanged between systems. As the number of devices, systems and data produced grows up, the risk of security breaches increases. This is all the more relevant in times of Covid-19, which has affected not only the health and lives of human beings’ but also the lifestyle of society, i.e. the digital environment has replaced the physical. This has led to an increase in cyber security threats of various nature. While security breaches and different security protection mechanisms have been widely covered in the literature, the concept of a “primitive” artifact such as data management system seems to have been more neglected by researchers and practitioners. But are data management systems always protected by default? Previous research and regular updates on data leakages suggest that the number and nature of these vulnerabilities are high. It also refers to little or no DBMS protection, especially in case of NoSQL, which are thus vulnerable to attacks. The aim of this paper is to examine whether “traditional” vulnerability registries provide a sufficiently comprehensive view of DBMS security, or they should be intensively and dynamically inspected by DBMS owners by referring to Internet of Things Search Engines moving towards a sustainable and resilient digitized environment. The paper brings attention to this problem and makes the reader think about data security before looking for and introducing more advanced security and protection mechanisms, which, in the absence of the above, may bring no value.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    https://db-engines.com/en/ranking.

References

  1. Pevnev, V., Kapchynskyi, S.: Database security: threats and preventive measures (2018)

    Google Scholar 

  2. Himeur, Y., Sohail, S. S., Bensaali, F., Amira, A., Alazab, M.: Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives. Comput. Secur. 102746 (2022)

    Google Scholar 

  3. Lallie, H.S., Shepherd, L.A., Nurse, J.R., Erola, A., Epiphaniou, G., Maple, C., Bellekens, X.: Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102248 (2021)

    Article  Google Scholar 

  4. Risk Based Security, Talentbuddy.co / Talentguide.co database exposed, company reacts swiftly (2016). https://www.riskbasedsecurity.com/2016/05/06/talentbuddy-co-talentguide-co-database-exposed-company-reacts-swiftly/. Last Accessed 31 Mar 2022

  5. Risk Based Security and Flashpoint 2021. Year end report vulnerability quickview (2021)

    Google Scholar 

  6. Verizon. Data Breach Investigations Report (DBIR), p. 119 (2021). https://www.verizon.com/business/resources/reports/2021/2021-data-breach-investigations-report.pdf. Last Accessed 31 Mar 2022

  7. Shi, F.: Threat spotlight: coronavirus-related phishing. Barracuda Networks (2020). https://blog.barracuda.com/2020/03/26/threat-spotlight-coronavirus-related-phishing. Last Accessed 31 Mar 2022

  8. Miles B.: How to minimize security risks: Follow these best practices for success (2022). https://www.techrepublic.com/article/minimizing-security-risks-best-practices/?utm_source=email&utm_medium=referral&utm_campaign=techrepublic-news-special-offers

  9. Daskevics, A., Nikiforova, A.: ShoBeVODSDT: Shodan and binary edge based vulnerable open data sources detection tool or what Internet of Things Search Engines know about you. In: 2021 Second International Conference on Intelligent Data Science Technologies and Applications (IDSTA), pp. 38–45. IEEE (2021)

    Google Scholar 

  10. Li, L., Qian, K., Chen, Q., Hasan, R., Shao, G.:. Developing hands-on labware for emerging database security. In: Proceedings of the 17th Annual Conference on Information Technology Education, pp. 60–64 (2016)

    Google Scholar 

  11. Fahd, K., Venkatraman, S., Hammeed, F.K.: A comparative study of NoSQL system vulnerabilities with big data. Int. J. Manage. Inf. Tech 11(4), 1–19 (2019)

    Google Scholar 

  12. Tunggal, A.: The 61 biggest data breaches (2021). https://www.upguard.com/blog/biggest-data-breaches. Last Accessed 31 Mar 2022

  13. Panda Security.: Over 1 billion people’s data leaked in an unsecured server (2019). https://www.pandasecurity.com/en/mediacenter/news/billion-consumers-data-breach-elasticsearch/

  14. Ferrari, D., Carminati, M., Polino, M., Zanero, S.: NoSQL breakdown: a large-scale analysis of misconfigured NoSQL services. In: Annual Computer Security Applications Conference, pp. 567–581 (2020)

    Google Scholar 

  15. Teimoor, R.A.: A review of database security concepts, risks, and problems. UHD J. Sci. Technol. 5(2), 38–46 (2021)

    Article  Google Scholar 

  16. Malik, M., Patel, T.: Database security-attacks and control methods. Int.J. Inf. 6(1/2), 175–183 (2016)

    Google Scholar 

Download references

Acknowledgements

This research has been funded by European Social Fund via IT Academy programme (University of Tartu)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anastasija Nikiforova .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nikiforova, A. (2023). Data Security as a Top Priority in the Digital World: Preserve Data Value by Being Proactive and Thinking Security First. In: Visvizi, A., Troisi, O., Grimaldi, M. (eds) Research and Innovation Forum 2022. RIIFORUM 2022. Springer Proceedings in Complexity. Springer, Cham. https://doi.org/10.1007/978-3-031-19560-0_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-19560-0_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-19559-4

  • Online ISBN: 978-3-031-19560-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics