Abstract
Smart cities assure the masses a higher quality of life through digital interconnectivity, leading to increased efficiency and accessibility in cities. In addition, a huge amount of data is being exchanged through smart devices, networks, cloud infrastructure, big data analysis and Internet of Things (IoT) applications in the various private and public sectors, such as critical infrastructures, financial sectors, healthcare, and Small and Medium Enterprises (SMEs). However, these sectors require maintaining certain security mechanisms to ensure the confidentiality and integrity of personal and critical information. However, unfortunately, organizations fail to maintain their security posture in terms of security mechanisms and controls, which leads to data breach incidents either intentionally or inadvertently due to the vulnerabilities in their information management systems that either malicious insiders or attackers exploit. In this paper, we highlight the importance of data breaches and issues related to information leakage incidents. In particular, the impact of data breaching incidents and the reasons contributing to such incidents affect the citizens’ well-being. In addition, this paper also discusses various preventive measures such as security mechanisms, laws, standards, procedures, and best practices, including follow-up mitigation strategies.
Funder
SAUDI ARAMCO Cybersecurity Chair
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Reference81 articles.
1. Tang, V., Cheng, S.W., Choy, K.L., Siu, P.K., Ho, G.T., and Lam, H.Y. (2016, January 24–29). An intelligent medical replenishment system for managing the medical resources in the healthcare industry. Proceedings of the 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2016), Vancouver, BC, Canada.
2. Protection of Big Data Privacy;Mehmood;IEEE Access,2016
3. Data at rest and it’s security solutions—A survey;Siddiqui;Int. J. Adv. Res. Comput. Sci.,2017
4. Big-data applications in the government sector;Kim;Commun. ACM,2014
5. A survey of emerging threats in cybersecurity;Nepal;J. Comput. Syst. Sci.,2014
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献