Securing the Digital Frontier: Strategies for Cloud Computing Security, Database Protection, and Comprehensive Penetration Testing

Udochukwu ThankGod Ikechukwu Igwenagu

Prairie View A&M University, 100 University Dr, Prairie View, TX 77446, USA.

Abidemi Ayodotun Salami

Ilinois State University, 100 N University St, Normal, IL 61761, USA.

Abayomi Shamsudeen Arigbabu

University of Alberta, Edmonton, Alberta, Canada.

Cassandra Esambe Mesode

The University of Douala, Carrefour Ange Raphaël, Douala, Cameroon.

Tunbosun Oyewale Oladoyinbo

University of Maryland Global Campus, 3501 University Blvd E, Adelphi, MD 20783, USA.

Oluwaseun Oladeji Olaniyi *

University of the Cumberlands, 104 Maple Drive, Williamsburg, KY 40769, United States of America.

*Author to whom correspondence should be addressed.


This research paper explores the effectiveness of integrated cybersecurity strategies, focusing on the amalgamation of cloud computing security, database protection, and penetration testing into a unified risk management framework. The primary aim is to evaluate how such integration impacts the overall cybersecurity posture of organizations, offering insights into mitigating cyber threats, unauthorized access, and data breaches. Employing a survey-based methodology, the study gathered data from 365 professionals across cloud computing, database administration, and cybersecurity fields. Through descriptive statistics and Partial Least Squares Structural Equation Modeling (PLS-SEM), the research explored the interrelations between various cybersecurity strategies and their collective influence on organizational resilience against cyber threats. The findings underscore the significant benefits of a holistic cybersecurity approach, revealing that penetration testing, robust database security measures, and strict adherence to cloud computing security requirements significantly reduce vulnerabilities and incidents of data breaches. Moreover, the study established that a unified risk management framework substantially enhances an organization's cybersecurity posture, highlighting the critical role of integrated security measures in fostering organizational resilience. The research confirms the hypothesis that incorporating cybersecurity strategies across different domains leads to a synergistic enhancement of security defenses, offering a more robust mechanism against the multifaceted nature of cyber threats. In conclusion, the study advocates for the adoption of a comprehensive, integrated approach to cybersecurity, emphasizing regular penetration testing, stringent database security protocols, and adherence to cloud computing security standards as essential components of a robust cybersecurity framework. This approach not only mitigates the risk of cyber threats but  also strengthens organizational resilience, ensuring a secure digital environment for future challenges.

Keywords: Cybersecurity, integrated cybersecurity strategies, cloud computing security, database protection, penetration testing, unified risk management framework, organizational resilience, cyber threats

How to Cite

Igwenagu, U. T. I., Salami , A. A., Arigbabu , A. S., Mesode, C. E., Oladoyinbo , T. O., & Olaniyi , O. O. (2024). Securing the Digital Frontier: Strategies for Cloud Computing Security, Database Protection, and Comprehensive Penetration Testing. Journal of Engineering Research and Reports, 26(6), 60–75.


Download data is not yet available.


George DAS, George ASH. Riding the wave: An exploration of emerging technologies reshaping modern industry. Partners Universal International Innovation Journal (PUIIJ). 2024;02(01): 15–38 DOI:

Janet Julia Ang'udi. Security challenges in cloud computing: A comprehensive analysis. World Journal of Advanced Engineering Technology and Sciences. 2023;10(2):155–181 DOI:

Olaniyi OO, Okunleye OJ, Olabanji SO, Asonze CU, Ajayi SA. IOT security in the era of ubiquitous computing: A multidisciplinary approach to addressing vulnerabilities and promoting resilience. Asian Journal of Research in Computer Science. 2023;16(4):354–371.


Oladoyinbo TO, Olabanji SO, Olaniyi OO, Adebiyi OO, Okunleye OJ, Alao AI. Exploring the challenges of artificial intelligence in data integrity and its influence on social dynamics. Asian Journal of Advanced Research and Reports. 2024;18(2):1–23. DOI:

Caselli M, Kargl F. A security assessment methodology for critical infrastructures. Critical Information Infrastructures Security. 2016;332–343. DOI:

Cao L, Jiang X, Zhao Y, Wang S, You D, Xu X. A survey of network attacks on cyber-physical systems. IEEE Access. 2020;8:44219–44227. DOI:

Figueroa-Lorenzo S, Añorga J, Arrizabalaga S. A role-based access control model in modbus scada systems. A centralized model approach. Sensors. 2019;19(20):4455. DOI:

Goel JN, Mehtre BM. Vulnerability assessment and penetration testing as a cyber defence technology. Procedia Computer Science. 2015;57:710–715. DOI:

Indeed. 6 Penetration Testing Methods (With Definition and Testing Stages).; 2023 Available:

Dalalana Bertoglio D, Zorzo AF. Overview and open issues on penetration test. Journal of the Brazilian Computer Society. 2017;23(1).


Morris M. Council post: The rising importance of penetration testing in critical infrastructure environments. Forbes; 2022. Available: (Accessed on: Apr. 06, 2024)

Pradeep I, Sakthivel G. Ethical hacking and penetration testing for securing us form Hackers. Journal of Physics: Conference Series. 2021;1831(1):012004.

DOI: 1831/1/012004

Phong CT, Yan WQ. An overview of penetration testing. International Journal of Digital Crime and Forensics. 2014;6(4):50–74 DOI:

Chickowski E. Cybersecurity penetration testing explained: What is pen testing?; 2020. Available:

Imperva. Learning Center. Expertise in Cybersecurity. Imperva. Learning Center; 2022 Available:

Olaniyi OO. Ballots and padlocks: Building digital trust and security in democracy through information governance strategies and block chain technologies. Asian Journal of Research in Computer Science. 2024;17(5):172–189. DOI:

Korpela K, Waterhead P. Planning for Information Security Testing—A Practical Approach. ISACA. 2016;5 Available:

Velimirovic A. 7 Reasons Why Your Business Needs Penetration Testing. PhoenixNAP Global IT Services; 2021. Available:

Olabanji SO. AI for identity and access management (IAM) in the cloud: Exploring the potential of artificial intelligence to improve user authentication, authorization, and access control within cloud-based systems. Asian Journal of Research in Computer Science. 2024;17(3):38–56.


Olaniyi OO, Ugonnia JC, Olaniyi FG, Arigbabu AT, Adigwe CS. Digital collaborative tools, strategic communication, and social capital: Unveiling the impact of digital transformation on organizational dynamics. Asian Journal of Research in Computer Science. 2024;17(5):140–156 DOI:

Barika M, Garg S, Zomaya AY, Wang L, Moorsel AV, Ranjan R. Orchestrating big data analysis workflows in the cloud. ACM Computing Surveys. 2019;52(5):1–41 DOI:

Hao S, Zhang H, Song M. Big data, big data analytics capability, and sustainable innovation performance. Sustainability. 2019;11(24):7145. DOI:

Arigbabu AT, Olaniyi OO, Adigwe CS, Adebiyi OO, Ajayi SA. Data governance in AI - enabled healthcare systems: A case of the project nightingale. Asian Journal of Research in Computer Science. 2024; 17(5):85–107. DOI:

Olabanji SO, Oladoyinbo TO, Asonze CU, Adigwe CS, Okunleye OJ, Olaniyi OO. Leveraging fintech compliance to mitigate cryptocurrency volatility for secure us employee retirement benefits: Bitcoin ETF case study. Asian Journal of Economics, Business and Accounting. 2024;24(4):147–167.


Google Cloud. What is encryption and how does it work? Google Cloud; 2023 Available: encryption#:~:text=Encryption%20is%20one%20of%20the

Adigwe CS, Mayeke NR, Olabanji SO, Okunleye OJ, Joeaneke PC, Olaniyi OO. The evolution of terrorism in the digital age: Investigating the adaptation of terrorist groups to cyber technologies for recruitment, propaganda, and cyberattacks. Asian Journal of Economics, Business and Accounting. 2024;24(3):289–306.


Chang V, et al. A survey on intrusion detection systems for fog and cloud computing. Future Internet. 2022;14(3):89. DOI:

Olabanji SO, Marquis YA, Adigwe CS, Abidemi AS, Oladoyinbo TO, Olaniyi OO. AI-driven cloud security: Examining the impact of user behavior analysis on threat detection. Asian Journal of Research in Computer Science. 2024;17(3):57–74. DOI:

Marquis YA, Oladoyinbo TO, Olabanji SO, Olaniyi OO, Ajayi SS. Proliferation of AI tools: A multifaceted evaluation of user perceptions and emerging trend. Asian Journal of Advanced Research and Reports. 2024;18(1):30–35. DOI:

Gravel N. Baseline security measures for cloud environments. Gray Gray and Gray, LLP; 2023. Available:

Rajput AS. Risk management in cloud computing. Scaler Topics; 2022.


Adebiyi OO, Olabanji SO, Olaniyi OO. Promoting inclusive accounting education through the integration of stem principles for a diverse classroom. Asian Journal of Education and Social Studies. 2023;49 (4):152–171. DOI:

Kim H, Wasicek A, Mehne B, Lee EA. A secure network architecture for the internet of things based on local authorization entities. Presented at the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud); 2016. DOI:

Penelova M. Access control models. Cybernetics and Information Technologies. 2021;21(4):77–104.

DOI: 44

Adigwe CS, Olaniyi OO, Olagbaju OO, Olaniyi FG. Leading in a time of crisis: The coronavirus effect on leadership in America. Asian Journal of Economics, Business and Accounting. 2024;24(4):1–20 DOI:

Shi B. Computer network information security protection based on virtual private network. Journal of Physics: Conference Series. 2020;1646(1):012121. DOI: 1646/1/012121

Reed B. Bb Collaborate.; 2023. Available:

Olabanji SO, Oladoyinbo OB, Asonze CU, Oladoyinbo TO, Ajayi SA, Olaniyi OO. Effect of adopting AI to explore big data on personally identifiable information (PII) for financial and economic data transformation. Asian Journal of Economics, Business and Accounting. 2024;24(4):106–125.


Velimirovic A. 8 types of firewalls: Guide for it security pros. Phoenix NAP Global IT Services; 2020.


Gomez C. Proactive management of plant cybersecurity: A combination of information technology (it) and operations technology (OT) cybersecurity expertise is required to manage the Infux of industrial internet of things (IIOT) devices and increased it/OT integration. Control Engineering. 2019; 66(2).


Al-Fedaghi S, Alsumait O. Towards a conceptual foundation for physical security: Case study of an it department. International Journal of Safety and Security Engineering. 2019;9(2):137–156 DOI:

IBM. Database Security: An Essential Guide. IBM.; 2023 Available:

Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A. Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine. Electronics. 2020;9 (1):173 DOI:

Abalaka AI, Olaniyi OO, Adebiyi OO. Understanding and overcoming the limitations to strategy execution in hotels within the small and medium enterprises sector. Asian Journal of Economics, Business and Accounting. 2023;23(22):26–36 DOI:

Microsoft. Database Security Best Practices and Solutions, Microsoft Azure,; 2023. Available:

Wang Z, Sun L, Zhu H. Defining social engineering in cybersecurity. IEEE Access. 2020;8:85094–85115.


Okta. Intrusion Prevention System: What Is An IPS? How Do They Work? Okta,; 2023.


Mayeke NR, Arigbabu AT, Olaniyi OO, Okunleye OJ, Adigwe CS. Evolving access control paradigms: A comprehensive multi-dimensional analysis of security risks and system assurance in cyber engineering. 2024;17(5):108–124 DOI:

Sail Point. Authentication Methods Used for Network Security. Sail Point; 2020 Available:

velimirovic A. What Is an Intrusion Detection System? {4 Types of IDS Explained}. Phoenix NAP Blog; 2021. Available:

Oluwaseun Oladeji Olaniyi, Christopher Uzoma Asonze, Samson Abidemi Ajayi, Samuel Oladiipo Olabanji, Chinasa Susan Adigwe. A regressional study on the impact of organizational security culture and transformational leadership on social engineering awareness among bank employees: The interplay of security education and behavioral change. Asian Journal of Economics, Business and Accounting. 2023;23(23):128–143. DOI:

Friedman A, West D. Privacy and Security in Cloud Computing 1 Privacy and Security in Cloud Computing; 2010. Available:

Fotiou N, Machas A, Polyzos GC, Xylomenos G. Access control as a service for the cloud. Journal of Internet Services and Applications. 2015;6(1). DOI:

Haris M, Khan RZ. A systematic review on cloud computing. International Journal of Computer Sciences and Engineering. 2018;6(11):632–639 DOI:

Morning Star Law Network. Cloud Computing Legal Issues: Cyber piracy, Hacking and IP. Morningstar. Morningstar Law Group; 2015 Available:

Olaniyi OO, Shah N, Bahuguna N. Quantitative analysis and comparative review of dividend policy dynamics within the banking sector: Insights from global and U.S. financial data and existing literature. Asian Journal of Economics, Business and Accounting. 2023;23(23): 179–199 DOI:

Posey B. Business Continuity in the cloud: Benefits and Planning Tips. Search Disaster Recovery; 2022. Available:

Puchley T, Toppi C. ProQuest. Better research, better learning, better insights.; 2024. Available: (Accessed on: Apr. 06, 2024)

RJ. E-discovery in the cloud introduces security, compliance issues. Tech Target. CIO; 2018 Available: (accessed Apr. 06, 2024)

Victor-Mgbachi T. Navigating cybersecurity beyond compliance: Understanding your threat landscape and vulnerabilities. IRE Journals. 2024;7. Available:

Kasowaki L, Deniz E. Securing the future: Strategies and technologies for cyber protection;. 2024. Available:

Nuno MC, Manuela CC. Exploring cyber criminals and data privacy measures. IGI Global; 2023. Available:

Safitra MF, Lubis M, Fakhrurroja H. Counterattacking cyber threats: A framework for the future of cybersecurity. Sustainability. 2023;15(18): 13369. DOI:

Tahmasebi M. Beyond defense: Proactive approaches to disaster recovery and threat intelligence in modern enterprises. Journal of Information Security. 2024;15(2):106–133. DOI:

Grigaliūnas Š, Schmidt M, Brūzgienė R, Smyrli P, Bidikov V. Leveraging taxonomical engineering for security baseline compliance in international regulatory frameworks. Future Internet. 2023;15(10):330.


Herath TC, Herath HSB, Cullum D. An information security performance measurement tool for senior managers: Balanced scorecard integration for security governance and control frameworks. Information Systems Frontiers; 2022 DOI:

AL-Hawamleh A. Cyber resilience framework: Strengthening defenses and enhancing continuity in business security. International Journal of Computing and Digital Systems. 2024;15(1):1315–1331.


Olaniyi OO, Okunleye OJ, Olabanji SO. Advancing data-driven decision-making in smart cities through big data analytics: A comprehensive review of existing literature. Current Journal of Applied Science and Technology. 2023;42(25):10–18. DOI: