Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Nov 30;22(23):9338.
doi: 10.3390/s22239338.

Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance

Affiliations

Getting Smarter about Smart Cities: Improving Data Security and Privacy through Compliance

Mudassar Aslam et al. Sensors (Basel). .

Abstract

Smart cities assure the masses a higher quality of life through digital interconnectivity, leading to increased efficiency and accessibility in cities. In addition, a huge amount of data is being exchanged through smart devices, networks, cloud infrastructure, big data analysis and Internet of Things (IoT) applications in the various private and public sectors, such as critical infrastructures, financial sectors, healthcare, and Small and Medium Enterprises (SMEs). However, these sectors require maintaining certain security mechanisms to ensure the confidentiality and integrity of personal and critical information. However, unfortunately, organizations fail to maintain their security posture in terms of security mechanisms and controls, which leads to data breach incidents either intentionally or inadvertently due to the vulnerabilities in their information management systems that either malicious insiders or attackers exploit. In this paper, we highlight the importance of data breaches and issues related to information leakage incidents. In particular, the impact of data breaching incidents and the reasons contributing to such incidents affect the citizens' well-being. In addition, this paper also discusses various preventive measures such as security mechanisms, laws, standards, procedures, and best practices, including follow-up mitigation strategies.

Keywords: Personal Identity Information (PII); compliance; data breaches; information security policies and procedures; vulnerabilities.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest.

Figures

Figure 1
Figure 1
Large attack surface exposed by the connected infrastructure cause data breaches.
Figure 2
Figure 2
Data Breaches’ Taxonomy.
Figure 3
Figure 3
PCI DSS security goals and 12 principal requirements for the protection of cardholder data [39].
Figure 4
Figure 4
HSS Recommended Compliance Process.
Figure 5
Figure 5
Data breach response steps.
Figure 6
Figure 6
Graphical view of reasons contributing to data breaches.
Figure 7
Figure 7
Graphical view of all counter measures to data breaches.
Figure 8
Figure 8
Continuous data breach risk assessment framework.

Similar articles

Cited by

References

    1. Tang V., Cheng S.W., Choy K.L., Siu P.K., Ho G.T., Lam H.Y. An intelligent medical replenishment system for managing the medical resources in the healthcare industry; Proceedings of the 2016 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2016); Vancouver, BC, Canada. 24–29 July 2016; - DOI
    1. Mehmood A., Natgunanathan I., Xiang Y., Hua G., Guo S. Protection of Big Data Privacy. IEEE Access. 2016;4:1821–1834. doi: 10.1109/ACCESS.2016.2558446. - DOI
    1. Siddiqui F., Matloob G. Data at rest and it’s security solutions—A survey. Int. J. Adv. Res. Comput. Sci. 2017;8:1491–1493.
    1. Kim G.H., Trimi S., Chung J.H. Big-data applications in the government sector. Commun. ACM. 2014;57:78–85. doi: 10.1145/2500873. - DOI
    1. Jang-Jaccard J., Nepal S. A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 2014;80:973–993. doi: 10.1016/j.jcss.2014.02.005. - DOI

LinkOut - more resources