Abstract
Today, large amounts of data are being continuously produced, collected, and exchanged between systems. As the number of devices, systems and data produced grows up, the risk of security breaches increases. This is all the more relevant in times of Covid-19, which has affected not only the health and lives of human beings’ but also the lifestyle of society, i.e. the digital environment has replaced the physical. This has led to an increase in cyber security threats of various nature. While security breaches and different security protection mechanisms have been widely covered in the literature, the concept of a “primitive” artifact such as data management system seems to have been more neglected by researchers and practitioners. But are data management systems always protected by default? Previous research and regular updates on data leakages suggest that the number and nature of these vulnerabilities are high. It also refers to little or no DBMS protection, especially in case of NoSQL, which are thus vulnerable to attacks. The aim of this paper is to examine whether “traditional” vulnerability registries provide a sufficiently comprehensive view of DBMS security, or they should be intensively and dynamically inspected by DBMS owners by referring to Internet of Things Search Engines moving towards a sustainable and resilient digitized environment. The paper brings attention to this problem and makes the reader think about data security before looking for and introducing more advanced security and protection mechanisms, which, in the absence of the above, may bring no value.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Pevnev, V., Kapchynskyi, S.: Database security: threats and preventive measures (2018)
Himeur, Y., Sohail, S. S., Bensaali, F., Amira, A., Alazab, M.: Latest trends of security and privacy in recommender systems: a comprehensive review and future perspectives. Comput. Secur. 102746 (2022)
Lallie, H.S., Shepherd, L.A., Nurse, J.R., Erola, A., Epiphaniou, G., Maple, C., Bellekens, X.: Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102248 (2021)
Risk Based Security, Talentbuddy.co / Talentguide.co database exposed, company reacts swiftly (2016). https://www.riskbasedsecurity.com/2016/05/06/talentbuddy-co-talentguide-co-database-exposed-company-reacts-swiftly/. Last Accessed 31 Mar 2022
Risk Based Security and Flashpoint 2021. Year end report vulnerability quickview (2021)
Verizon. Data Breach Investigations Report (DBIR), p. 119 (2021). https://www.verizon.com/business/resources/reports/2021/2021-data-breach-investigations-report.pdf. Last Accessed 31 Mar 2022
Shi, F.: Threat spotlight: coronavirus-related phishing. Barracuda Networks (2020). https://blog.barracuda.com/2020/03/26/threat-spotlight-coronavirus-related-phishing. Last Accessed 31 Mar 2022
Miles B.: How to minimize security risks: Follow these best practices for success (2022). https://www.techrepublic.com/article/minimizing-security-risks-best-practices/?utm_source=email&utm_medium=referral&utm_campaign=techrepublic-news-special-offers
Daskevics, A., Nikiforova, A.: ShoBeVODSDT: Shodan and binary edge based vulnerable open data sources detection tool or what Internet of Things Search Engines know about you. In: 2021 Second International Conference on Intelligent Data Science Technologies and Applications (IDSTA), pp. 38–45. IEEE (2021)
Li, L., Qian, K., Chen, Q., Hasan, R., Shao, G.:. Developing hands-on labware for emerging database security. In: Proceedings of the 17th Annual Conference on Information Technology Education, pp. 60–64 (2016)
Fahd, K., Venkatraman, S., Hammeed, F.K.: A comparative study of NoSQL system vulnerabilities with big data. Int. J. Manage. Inf. Tech 11(4), 1–19 (2019)
Tunggal, A.: The 61 biggest data breaches (2021). https://www.upguard.com/blog/biggest-data-breaches. Last Accessed 31 Mar 2022
Panda Security.: Over 1 billion people’s data leaked in an unsecured server (2019). https://www.pandasecurity.com/en/mediacenter/news/billion-consumers-data-breach-elasticsearch/
Ferrari, D., Carminati, M., Polino, M., Zanero, S.: NoSQL breakdown: a large-scale analysis of misconfigured NoSQL services. In: Annual Computer Security Applications Conference, pp. 567–581 (2020)
Teimoor, R.A.: A review of database security concepts, risks, and problems. UHD J. Sci. Technol. 5(2), 38–46 (2021)
Malik, M., Patel, T.: Database security-attacks and control methods. Int.J. Inf. 6(1/2), 175–183 (2016)
Acknowledgements
This research has been funded by European Social Fund via IT Academy programme (University of Tartu)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Nikiforova, A. (2023). Data Security as a Top Priority in the Digital World: Preserve Data Value by Being Proactive and Thinking Security First. In: Visvizi, A., Troisi, O., Grimaldi, M. (eds) Research and Innovation Forum 2022. RIIFORUM 2022. Springer Proceedings in Complexity. Springer, Cham. https://doi.org/10.1007/978-3-031-19560-0_1
Download citation
DOI: https://doi.org/10.1007/978-3-031-19560-0_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-19559-4
Online ISBN: 978-3-031-19560-0
eBook Packages: Computer ScienceComputer Science (R0)