Classification of Cybersecurity Threats, Vulnerabilities and Countermeasures in Database Systems

被引:0
作者
Almaiah, Mohammed Amin [1 ]
Saqr, Leen Mohammad [1 ]
Al-Rawwash, Leen Ahmad [1 ]
Altellawi, Layan Ahmed [1 ]
Al-Ali, Romel [2 ]
Almomani, Omar [3 ]
机构
[1] Univ Jordan, King Abdullah IT Sch 2, Amman 11942, Jordan
[2] King Faisal Univ, Natl Res Ctr Giftedness & Creat, Al Hasa 31982, Saudi Arabia
[3] Al Ahliyya Amman Univ, Dept Networks & Cybersecur, Amman 19328, Jordan
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2024年 / 81卷 / 02期
关键词
Cyber threats; database systems; cyber risk assessment; vulnerabilities; countermeasures;
D O I
10.32604/cmc.2024.057673
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Database systems have consistently been prime targets for cyber-attacks and threats due to the critical nature of the data they store. Despite the increasing reliance on database management systems, this field continues to face numerous cyber-attacks. Database management systems serve as the foundation of any information system or application. Any cyber-attack can result in significant damage to the database system and loss of sensitive data. Consequently, cyber risk classifications and assessments play a crucial role in risk management and establish an essential framework for identifying and responding to cyber threats. Risk assessment aids in understanding the impact of cyber threats and developing appropriate security controls to mitigate risks. The primary objective of this study is to conduct a comprehensive analysis of cyber risks in database management systems, including classifying threats, vulnerabilities, impacts, and countermeasures. This classification helps to identify suitable security controls to mitigate cyber risks for each type of threat. Additionally, this research aims to explore technical countermeasures to protect database systems from cyber threats. This study employs the content analysis method to collect, analyze, and classify data in terms of types of threats, vulnerabilities, and countermeasures. The results indicate that SQL injection attacks and Denial of Service (DoS) attacks were the most prevalent technical threats in database systems, each accounting for 9% of incidents. Vulnerable audit trails, intrusion attempts, and ransomware attacks were classified as the second level of technical threats in database systems, comprising 7% and 5% of incidents, respectively. Furthermore, the findings reveal that insider threats were the most common non-technical threats in database systems, accounting for 5% of incidents. Moreover, the results indicate that weak authentication, unpatched databases, weak audit trails, and multiple usage of an account were the most common technical vulnerabilities in database systems, each accounting for 9% of vulnerabilities. Additionally, software bugs, insecure coding practices, weak security controls, insecure networks, password misuse, weak encryption practices, and weak data masking were classified as the second level of security vulnerabilities in database systems, each accounting for 4% of vulnerabilities. The findings from this work can assist organizations in understanding the types of cyber threats and developing robust strategies against cyber-attacks.
引用
收藏
页码:3189 / 3220
页数:32
相关论文
共 17 条
[1]   A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures [J].
Ahmad, Hussain ;
Dharmadasa, Isuru ;
Ullah, Faheem ;
Babar, Muhammad Ali .
ACM COMPUTING SURVEYS, 2023, 55 (09)
[2]  
Almaiah M. A., 2021, Artificial Intelligence and Blockchain for Future Cybersecurity Applications, P217
[3]   Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions [J].
Altulaihan, Esra ;
Almaiah, Mohammed Amin ;
Aljughaiman, Ahmed .
ELECTRONICS, 2022, 11 (20)
[4]  
[Anonymous], 2023, Mesopotamian journal of Cybersecurity, P30
[5]   A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions [J].
Aslan, Omer ;
Aktug, Semih Serkant ;
Ozkan-Okay, Merve ;
Yilmaz, Abdullah Asim ;
Akin, Erdal .
ELECTRONICS, 2023, 12 (06)
[6]  
Bandari V., 2023, International Journal of Business Intelligence and Big Data Analytics, V6, P1, DOI DOI 10.17613/9FER-NW82
[7]   Climate and Land Use Controls on Soil Organic Carbon in the Loess Plateau Region of China [J].
Dang, Yaai ;
Ren, Wei ;
Tao, Bo ;
Chen, Guangsheng ;
Lu, Chaoqun ;
Yang, Jia ;
Pan, Shufen ;
Wang, Guodong ;
Li, Shiqing ;
Tian, Hanqin .
PLOS ONE, 2014, 9 (05)
[8]   On cloud security requirements, threats, vulnerabilities and countermeasures: A survey [J].
Kumar, Rakesh ;
Goyal, Rinkaj .
COMPUTER SCIENCE REVIEW, 2019, 33 :1-48
[9]  
Naguib Ahmed, 2024, 2024 6th International Conference on Computing and Informatics (ICCI), P120, DOI 10.1109/ICCI61671.2024.10485182
[10]   Mitigation strategies against the phishing attacks: A systematic literature review [J].
Naqvi, Bilal ;
Perova, Kseniia ;
Farooq, Ali ;
Makhdoom, Imran ;
Oyedeji, Shola ;
Porras, Jari .
COMPUTERS & SECURITY, 2023, 132