Skip to main navigation Skip to search Skip to main content

NoSQL security: Can my data-driven decision-making be influenced from outside?

  • Anastasija Ņikiforova*
  • , Artjoms Daškevičs
  • , Otmane Azeroual
  • *Corresponding author for this work
    • University of Tartu
    • University of Latvia
    • German Centre for Higher Education Research and Science Studies

    Research output: Chapter in Book/Report/Conference proceedingChapterResearchpeer-review

    1 Citation (Scopus)

    Abstract

    Nowadays, there are billions interconnected devices forming Cyber-Physical Systems (CPS), Internet of Things (IoT) and Industrial Internet of Things (IIoT) ecosystems. With an increasing number of devices and systems in use, amount and the value of data, the risks of security breaches increase. One of these risks is posed by open data sources, which are databases that are not properly protected. These poorly protected databases are accessible to external actors, which poses a serious risk to the data holder and the results of data-related activities such as analysis, forecasting, monitoring, decision-making, policy development, and the whole contemporary society. This chapter aims at examining the state of the security of open data databases representing both relational databases and NoSQL, with a particular focus on a later category.

    Original languageEnglish
    Title of host publicationBig Data and Decision-Making
    Subtitle of host publicationApplications and Uses in the Public and Private Sector
    Place of PublicationBingley
    PublisherEmerald Publishing Limited
    Pages59-73
    Number of pages15
    ISBN (Electronic)9781803825519
    ISBN (Print)9781803825533
    DOIs
    Publication statusPublished - 30 Jan 2023

    UN SDGs

    This output contributes to the following UN Sustainable Development Goals (SDGs)

    1. SDG 9 - Industry, Innovation, and Infrastructure
      SDG 9 Industry, Innovation, and Infrastructure

    Keywords

    • Big data
    • Database
    • Internet of Things Search Engine
    • NoSQL
    • OSINT
    • Penetration testing
    • Search Engines for the Internet of everything
    • Secure by design
    • Security
    • Vulnerability

    Fingerprint

    Dive into the research topics of 'NoSQL security: Can my data-driven decision-making be influenced from outside?'. Together they form a unique fingerprint.

    Cite this