论文标题
数据安全是数字世界中的重中之重:通过主动和思考安全性保留数据价值
Data security as a top priority in the digital world: preserve data value by being proactive and thinking security first
论文作者
论文摘要
如今,系统之间正在连续生产,收集和交换大量数据。随着设备,系统和数据产生的数量的成长,安全漏洞的风险增加了。在19日期,这不仅影响了人类的健康和生活,而且还影响了社会的生活方式,即数字环境取代了身体。这导致了各种性质的网络安全威胁的增加。尽管文献中已广泛涵盖了安全漏洞和不同的安全保护机制,但研究人员和从业者似乎更忽略了原始人工制品的概念。但是数据管理系统是否始终默认为保护?以前的研究和数据泄漏的定期更新表明,这些漏洞的数量和性质很高。它也很少或没有DBMS保护,尤其是在NOSQL的情况下,因此很容易受到攻击。本文的目的是检查传统的脆弱性注册机构是否提供了DBMS安全性的足够全面的看法,或者应通过指代搜索引擎朝着可持续和富有弹性的数字化环境转向搜索引擎,对DBMS所有者进行深入和动态检查。该论文引起了人们对这个问题的关注,并使读者在寻找并引入更高级的安全性和保护机制之前考虑数据安全性,在没有上述情况的情况下,这可能不会带来任何价值。
Today, large amounts of data are being continuously produced, collected, and exchanged between systems. As the number of devices, systems and data produced grows up, the risk of security breaches increases. This is all the more relevant in times of COVID-19, which has affected not only the health and lives of human beings' but also the lifestyle of society, i.e., the digital environment has replaced the physical. This has led to an increase in cyber security threats of various nature. While security breaches and different security protection mechanisms have been widely covered in the literature, the concept of a primitive artifact such as data management system seems to have been more neglected by researchers and practitioners. But are data management systems always protected by default? Previous research and regular updates on data leakages suggest that the number and nature of these vulnerabilities are high. It also refers to little or no DBMS protection, especially in case of NoSQL, which are thus vulnerable to attacks. The aim of this paper is to examine whether traditional vulnerability registries provide a sufficiently comprehensive view of DBMS security, or they should be intensively and dynamically inspected by DBMS owners by referring to Internet of Things Search Engines moving towards a sustainable and resilient digitized environment. The paper brings attention to this problem and makes the reader think about data security before looking for and introducing more advanced security and protection mechanisms, which, in the absence of the above, may bring no value.