STM Article Repository

Igwenagu, Udochukwu ThankGod Ikechukwu and Salami, Abidemi Ayodotun and Arigbabu, Abayomi Shamsudeen and Mesode, Cassandra Esambe and Oladoyinbo, Tunbosun Oyewale and Olaniyi, Oluwaseun Oladeji (2024) Securing the Digital Frontier: Strategies for Cloud Computing Security, Database Protection, and Comprehensive Penetration Testing. Journal of Engineering Research and Reports, 26 (6). pp. 60-75. ISSN 2582-2926

[thumbnail of Olaniyi2662024JERR116244.pdf] Text
Olaniyi2662024JERR116244.pdf - Published Version

Download (377kB)

Abstract

This research paper explores the effectiveness of integrated cybersecurity strategies, focusing on the amalgamation of cloud computing security, database protection, and penetration testing into a unified risk management framework. The primary aim is to evaluate how such integration impacts the overall cybersecurity posture of organizations, offering insights into mitigating cyber threats, unauthorized access, and data breaches. Employing a survey-based methodology, the study gathered data from 365 professionals across cloud computing, database administration, and cybersecurity fields. Through descriptive statistics and Partial Least Squares Structural Equation Modeling (PLS-SEM), the research explored the interrelations between various cybersecurity strategies and their collective influence on organizational resilience against cyber threats. The findings underscore the significant benefits of a holistic cybersecurity approach, revealing that penetration testing, robust database security measures, and strict adherence to cloud computing security requirements significantly reduce vulnerabilities and incidents of data breaches. Moreover, the study established that a unified risk management framework substantially enhances an organization's cybersecurity posture, highlighting the critical role of integrated security measures in fostering organizational resilience. The research confirms the hypothesis that incorporating cybersecurity strategies across different domains leads to a synergistic enhancement of security defenses, offering a more robust mechanism against the multifaceted nature of cyber threats. In conclusion, the study advocates for the adoption of a comprehensive, integrated approach to cybersecurity, emphasizing regular penetration testing, stringent database security protocols, and adherence to cloud computing security standards as essential components of a robust cybersecurity framework. This approach not only mitigates the risk of cyber threats but also strengthens organizational resilience, ensuring a secure digital environment for future challenges.

Item Type: Article
Subjects: GO for ARCHIVE > Engineering
Depositing User: Unnamed user with email support@goforarchive.com
Date Deposited: 07 May 2024 10:15
Last Modified: 07 May 2024 10:15
URI: http://eprints.go4mailburst.com/id/eprint/2262

Actions (login required)

View Item
View Item