Securing the Digital Frontier: Strategies for Cloud Computing Security, Database Protection, and Comprehensive Penetration Testing

Udochukwu ThankGod Ikechukwu Igwenagu

Prairie View A&M University, 100 University Dr, Prairie View, TX 77446, USA.

Abidemi Ayodotun Salami

Ilinois State University, 100 N University St, Normal, IL 61761, USA.

Abayomi Shamsudeen Arigbabu

University of Alberta, Edmonton, Alberta, Canada.

Cassandra Esambe Mesode

The University of Douala, Carrefour Ange Raphaël, Douala, Cameroon.

Tunbosun Oyewale Oladoyinbo

University of Maryland Global Campus, 3501 University Blvd E, Adelphi, MD 20783, USA.

Oluwaseun Oladeji Olaniyi *

University of the Cumberlands, 104 Maple Drive, Williamsburg, KY 40769, United States of America.

*Author to whom correspondence should be addressed.


Abstract

This research paper explores the effectiveness of integrated cybersecurity strategies, focusing on the amalgamation of cloud computing security, database protection, and penetration testing into a unified risk management framework. The primary aim is to evaluate how such integration impacts the overall cybersecurity posture of organizations, offering insights into mitigating cyber threats, unauthorized access, and data breaches. Employing a survey-based methodology, the study gathered data from 365 professionals across cloud computing, database administration, and cybersecurity fields. Through descriptive statistics and Partial Least Squares Structural Equation Modeling (PLS-SEM), the research explored the interrelations between various cybersecurity strategies and their collective influence on organizational resilience against cyber threats. The findings underscore the significant benefits of a holistic cybersecurity approach, revealing that penetration testing, robust database security measures, and strict adherence to cloud computing security requirements significantly reduce vulnerabilities and incidents of data breaches. Moreover, the study established that a unified risk management framework substantially enhances an organization's cybersecurity posture, highlighting the critical role of integrated security measures in fostering organizational resilience. The research confirms the hypothesis that incorporating cybersecurity strategies across different domains leads to a synergistic enhancement of security defenses, offering a more robust mechanism against the multifaceted nature of cyber threats. In conclusion, the study advocates for the adoption of a comprehensive, integrated approach to cybersecurity, emphasizing regular penetration testing, stringent database security protocols, and adherence to cloud computing security standards as essential components of a robust cybersecurity framework. This approach not only mitigates the risk of cyber threats but  also strengthens organizational resilience, ensuring a secure digital environment for future challenges.

Keywords: Cybersecurity, integrated cybersecurity strategies, cloud computing security, database protection, penetration testing, unified risk management framework, organizational resilience, cyber threats


How to Cite

Igwenagu, U. T. I., Salami , A. A., Arigbabu , A. S., Mesode, C. E., Oladoyinbo , T. O., & Olaniyi , O. O. (2024). Securing the Digital Frontier: Strategies for Cloud Computing Security, Database Protection, and Comprehensive Penetration Testing. Journal of Engineering Research and Reports, 26(6), 60–75. https://doi.org/10.9734/jerr/2024/v26i61162

Downloads

Download data is not yet available.

References

George DAS, George ASH. Riding the wave: An exploration of emerging technologies reshaping modern industry. Partners Universal International Innovation Journal (PUIIJ). 2024;02(01): 15–38 DOI:https://doi.org/10.5281/zenodo.10613734

Janet Julia Ang'udi. Security challenges in cloud computing: A comprehensive analysis. World Journal of Advanced Engineering Technology and Sciences. 2023;10(2):155–181 DOI:https://doi.org/10.30574/wjaets.2023.10.2.0304

Olaniyi OO, Okunleye OJ, Olabanji SO, Asonze CU, Ajayi SA. IOT security in the era of ubiquitous computing: A multidisciplinary approach to addressing vulnerabilities and promoting resilience. Asian Journal of Research in Computer Science. 2023;16(4):354–371.

DOI:https://doi.org/10.9734/ajrcos/2023/v16i4397

Oladoyinbo TO, Olabanji SO, Olaniyi OO, Adebiyi OO, Okunleye OJ, Alao AI. Exploring the challenges of artificial intelligence in data integrity and its influence on social dynamics. Asian Journal of Advanced Research and Reports. 2024;18(2):1–23. DOI:https://doi.org/10.9734/ajarr/2024/v18i2601

Caselli M, Kargl F. A security assessment methodology for critical infrastructures. Critical Information Infrastructures Security. 2016;332–343. DOI: https://doi.org/10.1007/978-3-319-31664-2_34

Cao L, Jiang X, Zhao Y, Wang S, You D, Xu X. A survey of network attacks on cyber-physical systems. IEEE Access. 2020;8:44219–44227. DOI:https://doi.org/10.1109/access.2020.2977423

Figueroa-Lorenzo S, Añorga J, Arrizabalaga S. A role-based access control model in modbus scada systems. A centralized model approach. Sensors. 2019;19(20):4455. DOI: https://doi.org/10.3390/s19204455

Goel JN, Mehtre BM. Vulnerability assessment and penetration testing as a cyber defence technology. Procedia Computer Science. 2015;57:710–715. DOI:https://doi.org/10.1016/j.procs.2015.07.458

Indeed. 6 Penetration Testing Methods (With Definition and Testing Stages). indeed.com; 2023 Available:https://www.indeed.com/career-advice/finding-a-job/penetration-testing-methods

Dalalana Bertoglio D, Zorzo AF. Overview and open issues on penetration test. Journal of the Brazilian Computer Society. 2017;23(1).

DOI:https://doi.org/10.1186/s13173-017-0051-1

Morris M. Council post: The rising importance of penetration testing in critical infrastructure environments. Forbes; 2022. Available:https://www.forbes.com/sites/forbestechcouncil/2022/07/21/the-rising-importance-of-penetration-testing-in-critical-infrastructure-environments/?sh=6e8d0d215220 (Accessed on: Apr. 06, 2024)

Pradeep I, Sakthivel G. Ethical hacking and penetration testing for securing us form Hackers. Journal of Physics: Conference Series. 2021;1831(1):012004.

DOI:https://doi.org/10.1088/1742-6596/ 1831/1/012004

Phong CT, Yan WQ. An overview of penetration testing. International Journal of Digital Crime and Forensics. 2014;6(4):50–74 DOI:https://doi.org/10.4018/ijdcf.2014100104

Chickowski E. Cybersecurity penetration testing explained: What is pen testing? cybersecurity.att.com; 2020. Available:https://cybersecurity.att.com/blogs/security-essentials/cybersecurity-penetration-testing-explained

Imperva. Learning Center. Expertise in Cybersecurity. Imperva. Learning Center; 2022 Available:https://www.imperva.com/learn/application-

Olaniyi OO. Ballots and padlocks: Building digital trust and security in democracy through information governance strategies and block chain technologies. Asian Journal of Research in Computer Science. 2024;17(5):172–189. DOI:https://doi.org/10.9734/ajrcos/2024/v17i5447

Korpela K, Waterhead P. Planning for Information Security Testing—A Practical Approach. ISACA. 2016;5 Available:https://www.isaca.org/resources/isaca-journal/issues/2016/volume-5/planning-for-information-security-testinga-practical-approach

Velimirovic A. 7 Reasons Why Your Business Needs Penetration Testing. PhoenixNAP Global IT Services; 2021. Available:https://phoenixnap.com/blog/penetration-testing

Olabanji SO. AI for identity and access management (IAM) in the cloud: Exploring the potential of artificial intelligence to improve user authentication, authorization, and access control within cloud-based systems. Asian Journal of Research in Computer Science. 2024;17(3):38–56.

DOI:https://doi.org/10.9734/ajrcos/2024/v17i3423

Olaniyi OO, Ugonnia JC, Olaniyi FG, Arigbabu AT, Adigwe CS. Digital collaborative tools, strategic communication, and social capital: Unveiling the impact of digital transformation on organizational dynamics. Asian Journal of Research in Computer Science. 2024;17(5):140–156 DOI:https://doi.org/10.9734/ajrcos/2024/v17i5444

Barika M, Garg S, Zomaya AY, Wang L, Moorsel AV, Ranjan R. Orchestrating big data analysis workflows in the cloud. ACM Computing Surveys. 2019;52(5):1–41 DOI: https://doi.org/10.1145/3332301

Hao S, Zhang H, Song M. Big data, big data analytics capability, and sustainable innovation performance. Sustainability. 2019;11(24):7145. DOI: https://doi.org/10.3390/su11247145

Arigbabu AT, Olaniyi OO, Adigwe CS, Adebiyi OO, Ajayi SA. Data governance in AI - enabled healthcare systems: A case of the project nightingale. Asian Journal of Research in Computer Science. 2024; 17(5):85–107. DOI:https://doi.org/10.9734/ajrcos/2024/v17i5441

Olabanji SO, Oladoyinbo TO, Asonze CU, Adigwe CS, Okunleye OJ, Olaniyi OO. Leveraging fintech compliance to mitigate cryptocurrency volatility for secure us employee retirement benefits: Bitcoin ETF case study. Asian Journal of Economics, Business and Accounting. 2024;24(4):147–167.

DOI:https://doi.org/10.9734/ajeba/2024/v24i41270

Google Cloud. What is encryption and how does it work? Google Cloud; 2023 Available:https://cloud.google.com/learn/what-is encryption#:~:text=Encryption%20is%20one%20of%20the

Adigwe CS, Mayeke NR, Olabanji SO, Okunleye OJ, Joeaneke PC, Olaniyi OO. The evolution of terrorism in the digital age: Investigating the adaptation of terrorist groups to cyber technologies for recruitment, propaganda, and cyberattacks. Asian Journal of Economics, Business and Accounting. 2024;24(3):289–306.

DOI:https://doi.org/10.9734/ajeba/2024/v24i31287

Chang V, et al. A survey on intrusion detection systems for fog and cloud computing. Future Internet. 2022;14(3):89. DOI: https://doi.org/10.3390/fi14030089

Olabanji SO, Marquis YA, Adigwe CS, Abidemi AS, Oladoyinbo TO, Olaniyi OO. AI-driven cloud security: Examining the impact of user behavior analysis on threat detection. Asian Journal of Research in Computer Science. 2024;17(3):57–74. DOI:https://doi.org/10.9734/ajrcos/2024/v17i3424

Marquis YA, Oladoyinbo TO, Olabanji SO, Olaniyi OO, Ajayi SS. Proliferation of AI tools: A multifaceted evaluation of user perceptions and emerging trend. Asian Journal of Advanced Research and Reports. 2024;18(1):30–35. DOI:https://doi.org/10.9734/ajarr/2024/v18i1596

Gravel N. Baseline security measures for cloud environments. Gray Gray and Gray, LLP; 2023. Available:https://www.gggllp.com/baseline-security-measures-for-cloud-environments/

Rajput AS. Risk management in cloud computing. Scaler Topics; 2022.

Available:https://www.scaler.com/topics/cloud-computing/risk-management-in-cloud-computing/

Adebiyi OO, Olabanji SO, Olaniyi OO. Promoting inclusive accounting education through the integration of stem principles for a diverse classroom. Asian Journal of Education and Social Studies. 2023;49 (4):152–171. DOI:https://doi.org/10.9734/ajess/2023/v49i41196

Kim H, Wasicek A, Mehne B, Lee EA. A secure network architecture for the internet of things based on local authorization entities. Presented at the 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud); 2016. DOI:https://doi.org/10.1109/ficloud.2016.24

Penelova M. Access control models. Cybernetics and Information Technologies. 2021;21(4):77–104.

DOI:https://doi.org/10.2478/cait-2021-00 44

Adigwe CS, Olaniyi OO, Olagbaju OO, Olaniyi FG. Leading in a time of crisis: The coronavirus effect on leadership in America. Asian Journal of Economics, Business and Accounting. 2024;24(4):1–20 DOI:https://doi.org/10.9734/ajeba/2024/v24i41261

Shi B. Computer network information security protection based on virtual private network. Journal of Physics: Conference Series. 2020;1646(1):012121. DOI:https://doi.org/10.1088/1742-6596/ 1646/1/012121

Reed B. Bb Collaborate. Bbcollab.com; 2023. Available:https://us-lti.bbcollab.com/collab/ui/session/playback

Olabanji SO, Oladoyinbo OB, Asonze CU, Oladoyinbo TO, Ajayi SA, Olaniyi OO. Effect of adopting AI to explore big data on personally identifiable information (PII) for financial and economic data transformation. Asian Journal of Economics, Business and Accounting. 2024;24(4):106–125.

DOI:https://doi.org/10.9734/ajeba/2024/v24i41268

Velimirovic A. 8 types of firewalls: Guide for it security pros. Phoenix NAP Global IT Services; 2020.

Available:https://phoenixnap.com/blog/types-of-firewalls

Gomez C. Proactive management of plant cybersecurity: A combination of information technology (it) and operations technology (OT) cybersecurity expertise is required to manage the Infux of industrial internet of things (IIOT) devices and increased it/OT integration. Control Engineering. 2019; 66(2).

Available:https://go.gale.com/ps/i.do?id=GALE%7CA578274083&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=00108049&p=AONE&sw=w&userGroupName=anon%7E80e2d563&aty=open-web-entry

Al-Fedaghi S, Alsumait O. Towards a conceptual foundation for physical security: Case study of an it department. International Journal of Safety and Security Engineering. 2019;9(2):137–156 DOI: https://doi.org/10.2495/SAFE-V9-N2-137-156

IBM. Database Security: An Essential Guide. IBM. www.ibm.com; 2023 Available:https://www.ibm.com/topics/database-security

Khraisat A, Gondal I, Vamplew P, Kamruzzaman J, Alazab A. Hybrid intrusion detection system based on the stacking ensemble of c5 decision tree classifier and one class support vector machine. Electronics. 2020;9 (1):173 DOI: https://doi.org/10.3390/electronics901017

Abalaka AI, Olaniyi OO, Adebiyi OO. Understanding and overcoming the limitations to strategy execution in hotels within the small and medium enterprises sector. Asian Journal of Economics, Business and Accounting. 2023;23(22):26–36 DOI:https://doi.org/10.9734/ajeba/2023/v23i221134

Microsoft. Database Security Best Practices and Solutions, Microsoft Azure, azure.microsoft.com; 2023. Available:https://azure.microsoft.com/en-us/resources/cloud-computing-dictionary/what-is-database-security/#faq

Wang Z, Sun L, Zhu H. Defining social engineering in cybersecurity. IEEE Access. 2020;8:85094–85115.

DOI: https://doi.org/10.1109/access.2020.2992807

Okta. Intrusion Prevention System: What Is An IPS? How Do They Work? Okta, www.okta.com; 2023.

Available:https://www.okta.com/identity-101/intrusion-prevention-system/

Mayeke NR, Arigbabu AT, Olaniyi OO, Okunleye OJ, Adigwe CS. Evolving access control paradigms: A comprehensive multi-dimensional analysis of security risks and system assurance in cyber engineering. 2024;17(5):108–124 DOI:https://doi.org/10.9734/ajrcos/2024/v17i5442

Sail Point. Authentication Methods Used for Network Security. Sail Point; 2020 Available:https://www.sailpoint.com/identity-library/authentication-methods-used-for-network-security/

velimirovic A. What Is an Intrusion Detection System? {4 Types of IDS Explained}. Phoenix NAP Blog; 2021. Available:https://phoenixnap.com/blog/intrusion-detection-system

Oluwaseun Oladeji Olaniyi, Christopher Uzoma Asonze, Samson Abidemi Ajayi, Samuel Oladiipo Olabanji, Chinasa Susan Adigwe. A regressional study on the impact of organizational security culture and transformational leadership on social engineering awareness among bank employees: The interplay of security education and behavioral change. Asian Journal of Economics, Business and Accounting. 2023;23(23):128–143. DOI:https://doi.org/10.9734/ajeba/2023/v23i231176

Friedman A, West D. Privacy and Security in Cloud Computing 1 Privacy and Security in Cloud Computing; 2010. Available:https://www.brookings.edu/wpcontent/uploads/2016/06/1026_cloud_computing_friedman_west.pdf

Fotiou N, Machas A, Polyzos GC, Xylomenos G. Access control as a service for the cloud. Journal of Internet Services and Applications. 2015;6(1). DOI: https://doi.org/10.1186/s13174-015-0026-4

Haris M, Khan RZ. A systematic review on cloud computing. International Journal of Computer Sciences and Engineering. 2018;6(11):632–639 DOI:https://doi.org/10.26438/ijcse/v6i11.632639

Morning Star Law Network. Cloud Computing Legal Issues: Cyber piracy, Hacking and IP. Morningstar. Morningstar Law Group; 2015 Available:https://morningstarlawgroup.com/insights/cloud-computing-legal-issues/#:~:text=Legal%20issues%20that%20can%20arise

Olaniyi OO, Shah N, Bahuguna N. Quantitative analysis and comparative review of dividend policy dynamics within the banking sector: Insights from global and U.S. financial data and existing literature. Asian Journal of Economics, Business and Accounting. 2023;23(23): 179–199 DOI:https://doi.org/10.9734/ajeba/2023/v23i231180

Posey B. Business Continuity in the cloud: Benefits and Planning Tips. Search Disaster Recovery; 2022. Available:https://www.techtarget.com/searchdisasterrecovery/tip/Business-continuity-in-the-cloud-Benefits-and-planning-tips

Puchley T, Toppi C. ProQuest. Better research, better learning, better insights. Openathens.net; 2024. Available:https://go.openathens.net/redirector/ualr.edu?url=https://www.proquest.com/trade-journals/erm-evolving-risk-assessment-strategic-management/docview/2036210031/se-2 (Accessed on: Apr. 06, 2024)

RJ. E-discovery in the cloud introduces security, compliance issues. Tech Target. CIO; 2018 Available:https://www.techtarget.com/searchcio/tip/E-discovery-in-the-cloud-introduces-security-compliance-issues (accessed Apr. 06, 2024)

Victor-Mgbachi T. Navigating cybersecurity beyond compliance: Understanding your threat landscape and vulnerabilities. IRE Journals. 2024;7. Available: https://www.irejournals.com/formatedpaper/1705360.pdf

Kasowaki L, Deniz E. Securing the future: Strategies and technologies for cyber protection;. 2024. Available:https://easychair.org/publications/preprint_download/zwVJ

Nuno MC, Manuela CC. Exploring cyber criminals and data privacy measures. IGI Global; 2023. Available:https://books.google.com/books?hl=en&lr=&id=kWnWEAAAQBAJ&oi=fnd&pg=PP1&dq=Cybercriminals+increasingly+exploit+sophisticated+techniques+and+zeroday+vulnerabilities

Safitra MF, Lubis M, Fakhrurroja H. Counterattacking cyber threats: A framework for the future of cybersecurity. Sustainability. 2023;15(18): 13369. DOI: https://doi.org/10.3390/su151813369

Tahmasebi M. Beyond defense: Proactive approaches to disaster recovery and threat intelligence in modern enterprises. Journal of Information Security. 2024;15(2):106–133. DOI:https://doi.org/10.4236/jis.2024.152008

Grigaliūnas Š, Schmidt M, Brūzgienė R, Smyrli P, Bidikov V. Leveraging taxonomical engineering for security baseline compliance in international regulatory frameworks. Future Internet. 2023;15(10):330.

DOI: https://doi.org/10.3390/fi15100330

Herath TC, Herath HSB, Cullum D. An information security performance measurement tool for senior managers: Balanced scorecard integration for security governance and control frameworks. Information Systems Frontiers; 2022 DOI: https://doi.org/10.1007/s10796-022-10246-9

AL-Hawamleh A. Cyber resilience framework: Strengthening defenses and enhancing continuity in business security. International Journal of Computing and Digital Systems. 2024;15(1):1315–1331.

DOI: https://doi.org/10.12785/ijcds/150193

Olaniyi OO, Okunleye OJ, Olabanji SO. Advancing data-driven decision-making in smart cities through big data analytics: A comprehensive review of existing literature. Current Journal of Applied Science and Technology. 2023;42(25):10–18. DOI:https://doi.org/10.9734/cjast/2023/v42i254181