AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (2.4 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Research paper | Open Access

Developing a fail-safe culture in a cyber environment using MySQL replication technique

Fatima M. Isiaka1( )Salihu Abdullahi Audu2Mustafa Ahmed Umar2
Centre for Cyber Space, NSUK University, Keffi, Nigeria
Department of Computer Science, Centre for Cyber Space, Nasarawa State University, Keffi, Nigeria
Show Author Information

Abstract

Purpose

The dependence on the use of information systems for nearly every activity and functions in the internet is increasingly high. This form of interconnectedness has bolstered national economies, enhanced how governments interact with their citizens and how ordinary people connect with friends and family. However, this dependence has equally resulted to a high rise in vulnerability, threat and risk associated with more use of information and communication technology. Cyber-attacks that have the potential to disrupt or damage information system infrastructure are getting more complex with some level of sophistication. Traditional protection of information system infrastructure is no longer sufficient; systems have proven to be immune to failure or incidents. This paper aims to ensure that there is a continuous availability of services through a fail-safe proof.

Design/methodology/approach

MYSQL replication technique was used to develop a model based on three-tier layers using the principle of network interdependency and the replication techniques. Tier 1 depicts a Telecom organization serving as service provider that provides internet service to Tier 2 organization – a Bank; Tier 3 is the financial App that can be used by bank staff and customers. The fail-safe mode integrated mechanism enables Tier 3 to continue to render its services in the event of an attack on Tier 1 such as DDoS without disruption.

Findings

This technique succeeded in mitigating the loss of data if cyber incident occurred or reception of uninterrupted services is countered, which give rise to future master-to-master architecture.

Research limitations/implications

The study conducted is limited to the design and development of a fail-safe system for interdependent networks or systems using MYSQL replication technique.

Originality/value

In an interdependent environment such as the cyberspace, the sectors are interdependent for optimal results. The originality of the work ensures that there is availability of services which is sustained and that data integrity is assured using the fail-safe technique based on MySQL replication method.

Keywords

References

 
Arshad, J. and Matt, L. (2009), Issue on the Design of Efficient Fail-Safe Fault Tolerance, Vol. 10, IEEE, Piscataway, NJ, pp. 23-29.
 
Bishop, M. (2003), Computer Security: Art and Science, Vol. 12, Addison Wesley Professional, Westford, MA, pp. 23-34.
 
CERT UK and GCHQ (2012), Common Cyber Attacks: Reducing the Impact, Vol. 44, CERT-UK, pp. 24-28.
 
Chakraborty, A. (2009), Fault Tolerant Fail System for Railway Signalling, Vol. 12, WCECS, San Francisco, pp. 23-34.
 
FFIEC (2015), Cybersecurity Assessment Tools, UK FFIEC, Vol 12, pp. 23-34.
 
Gollmann, D. (2005a), “Why trust is bad for security”, Proceeding for the International Workshop on Security and Trust Management, Vol. 12, ENTCS, pp. 23-34.
 
Gollmann, D. (2005b), Computer Security, Vol. 45, John Wiley and Son, Hoboken, NJ, pp. 34-56.
 
Gollmann, D. (2005c), “Why trust is bad for security”, Proceeding for the International Workshop on Security and Trust Management, ENTCS, Vol. 45, pp. 34-56.
 
Gollmann, D. (2006), Security Engineering, Vol. 45, 2nd ed., Wiley, Hoboken, NJ, pp. 34-66.
 
Greene, L. (2012), Fail Safe vs Fail Secure: When and Where?, Vol. 3, Door and Hardware Institute, Chantilly, VA, pp. 45-67.
 
Guiho, G. and Hennehert, C. (2000), “Software validation in ICSE”, Proceeding of the 12th International Conference on Software Engineering, IEEE Computer Press, Vol. 56, pp. 67-76.
 
Ida, M., Abdul, G.A., Sonny, Z., Sigit, P. and Wigati, J. (2013), Data Breach on the Critical Information Infrastructures: Lessons from the Wikileaks, Vol. 6, IEEE, pp. 34-45.
 

Jack, F.A. (2011), “From fail-safe to safe-to-fail: sustainability and resilience in the new urban world: landscape architecture”, Regional Planning Studio and Student Research and Creation, Activity, Vol. 8, pp. 23-34.

 
Ken, H. (2003), “Vulnerability and vulnerability scanning. A white paper to help small and medium scale business understand the issues and some proposals to help resolves issues”, SAN Institute.
 
Larman, C. (2005), Applying UML and Pattern: An Introduction to Object Oriented Analysis and Design Iteration Development, Prentice Hall PTR, Upper Saddle River, NJ.
 
Leidigh, C. (2005), Fundamental Principles of Network Security, American Power Conversion (APC), RI.
 
Locked, M. (2014), Lockheed martin corporation, Annual Report.
 
Mbanaso, U.M., Chukwudebe, G.A. and Atimati, E.E. (2015), A Critical Assessment of Nigeria’s Presence on the Cyberspace, IEEE, p. 11.https://doi.org/10.1109/CYBER-Abuja.2015.7360509
 
Sajal, S., Sudip, S., Kajal, S. and Soumalya, G. (2015), Cyber Security Password Policy for Industrial Control Networks, Vol. 6, IEEE.
 
SANS (2002), “An overview of threat and risk assessment”, Developing a security-awareness culture: improving security decision making, SANS, Semantec (2012), Internet security report, Semantec corporation Volume 17, SANS Institute.
 
Semantec (2011), Advanced Persistent Threat: A Symantec Perspective, Preparing the Right Defence for the New Threats Landscape, Semantec Corporation, Mountain View, CA.
 
Steve, F. (2015), “Oracle database administrative guide, 11g release 2 oracle and/or its application”.
 
Willian, F.C. (2015), Cybersecurity Kill Chain, Vol. 10, ISACA.
 
Zahri, Y. and Syahrul, H.S. (2010), Safeguarding Malaysia’s Critical National Information Infrastructure (CNII) against Cyber Terrorism: Towards Development of a Policy Framework, Vol. 7, IEEE.
International Journal of Crowd Science
Pages 149-170
Cite this article:
Isiaka FM, Audu SA, Umar MA. Developing a fail-safe culture in a cyber environment using MySQL replication technique. International Journal of Crowd Science, 2020, 4(2): 149-170. https://doi.org/10.1108/IJCS-04-2018-0008

596

Views

40

Downloads

0

Crossref

0

Scopus

Altmetrics

Received: 27 April 2018
Revised: 11 June 2018
Accepted: 16 August 2018
Published: 07 April 2020
© The author(s)

Fatima M. Isiaka, Salihu Abdullahi Audu and Mustafa Ahmed Umar. Published in International Journal of Crowd Science. Published by Emerald Publishing Limited. This article is published under the Creative Commons Attribution (CC BY 4.0) licence. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this licence may be seen at http://creativecommons.org/licences/by/4.0/legalcode

Return