Another question to be asked is “why?” The answer is as follows – today, billions of interconnected devices form an Internet of Things (IoT) ecosystem. With an increasing number of devices and systems in use, the risk of security breaches increases. This even more the case in times of COVID-19 pandemics, when pandemics affected not only human beings’ health and lives but also lifestyle of the society, i.e. digital environment substituted the physical one. This led to an increase of cyber-security threats of different nature. At the same time, while security breaches and security protection mechanisms have been widely addressed in the literature, the notion of “primitive” artifact, such as database seems to have not been paid same attention of researchers and practitioners. But are databases always secure and protected by default, i.e. do databases follow the “security by design” principle? Previous research and regular updates on data leakages suggest that the number and nature of vulnerabilities of databases is very high. Several factors contribute to that and a variety of different measures can be employed to address the issue. Their complexity varies significantly. The aim of the panel is to examine both, the current research on data security, threats posed by weak security of databases, especially NoSQL databases, as well as the approaches to inspect and identify this issue with regards to the question of who owns data storage facilities, security by data storage facility type and country – whether this is country-specific or rather data storage facility-specific question?
In addition, this event and track to which my panel belongs to expects to cover broader security- and safety- related issue. To get a brief overview, let me provide an abstract of this track, which is as follows:
“The inroads of ICT in the fields of safety and security are overwhelming. While several opportunities have thus been created to foster the capacity of our security and defense systems, ICT is also the source of new risks and threats, e.g. cybersecurity issues and cyberwarfare. Amidst the debate on the added value that ICT may bring to the fields of public order (safety issues) and defending society from (mostly) external threats (security issues), ICT, and especially artificial intelligence (AI), has been hailed as the golden means to increased military capacity. The objective of this track is to map and explore recent advances in the field and to dwell on the question of the role of the human factor in contemporary defense systems, including the notions of leadership, administration, human-to-human interaction, and human-computer interaction. This track will be of particular interest to researchers and practitioners engaged with topics and issues relating to the military, policing, security, safety, and others” (source: Rii Forum)
In case you are interested in either my panel, or the track or the event in general, book the date – the event is scheduled to run on April 20-22, 2022 and will take place in hybrid mode, i.e. both online and offline modes will be acceptable. For those who prefer on-site events, it would be beneficial to know that it will be in Athens, Greece.
*** just in case you are interested in those articles I have referred to at the beginning of this post:
- Daskevics, A., Nikiforova, A. (2021) ShoBeVODSDT: Shodan and Binary Edge based vulnerable open data sources detection tool or what Internet of Things Search Engines know about you, 2021 Second International Conference on Intelligent Data Science Technologies and Applications (IDSTA), November 15-16, 2021. Tartu, Estonia
- Daskevics, A., Nikiforova, A. (2021) IoTSE-based open database vulnerability inspection in three Baltic countries: ShoBEVODSDT sees you, The 8th IEEE International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2021), December 6-9, 2021, Gandia, Spain.
- Azeroual, O.; Nikiforova, A. Apache Spark and MLlib-Based Intrusion Detection System or How the Big Data Technologies Can Secure the Data. Information 2022, 13, 58. https://doi.org/10.3390/info13020058, SNIP: 1.012, CiteScore: 3.0 (Q2 (Information Systems))