Assessing Organizational Cybersecurity Resilience a Holistic Approach to Threat Vector Analysis in Risk Management

Authors

  • Sneha Gogineni

Keywords:

Cybersecurity, Resilience, Threat, Risk Management

Abstract

It is critical for modern organisations to understand how cybersecurity measures have evolved and how effective they are in this era of pervasive digital threats. This research delves deeply into the ever-changing field of cybersecurity, tracking its evolution from time-honoured practices to cutting-edge, tech-driven strategies. Robust cybersecurity measures are required due to the complex cyber dangers that have been introduced by the digital age. Using a variety of organisational and industry-specific examples, this research traces the evolution, present state, and potential future of cybersecurity strategy. Finding out how cybersecurity measures have changed and how effective they are, where the gaps are, and how human behaviour, technology, and policy all interact is the main goal. This study expands upon a cybersecurity risk management framework by integrating a multi-layered approach that addresses threat identification, international information sharing, and executive training. The enhanced methodology prioritizes cyber threats based on probabilistic risk assessments, facilitates structured cyber intelligence exchange across borders, and implements adaptive training for key stakeholders. Results indicate that a structured, multi-tiered approach to cybersecurity significantly enhances organizational and national resilience, as demonstrated by improved response times and more targeted mitigation efforts.

Downloads

Download data is not yet available.

References

Buhas, V., Ponomarenko, I., Bugas, V., Ramskyi, A., & Sokolov, V. (2021). Using Machine Learning Techniques to Increase the Effectiveness of Cybersecurity. Cybersecurity Providing in Information and Telecommunication Systems II 2021, 3188(2), 273-281.

Cheng, E. C. K., & Wang, T. (2022). Institutional strategies for cybersecurity in higher education institutions. Information, 13(4), 192. DOI: 10.3390/info13040192.

Choudhary, A., Chaudhary, A., & Devi, S. (2022). Cyber Security With Emerging Technologies & Challenges. In 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) (pp. 1875-1879). IEEE. DOI: 10.1109/ICAC3N56670.2022.10074579.

Dave, D., Sawhney, G., Aggarwal, P., Silswal, N., & Khut, D. (2023). The new frontier of cybersecurity: emerging threats and innovations. arXiv preprint arXiv:2311.02630. DOI: 10.48550/arXiv.2311.02630.

Dorasamy, M., Joanis, G.C., Jiun, L.W., Jambulingam, M., Samsudin, R., & Cheng, N.J. (2019). Cybersecurity issues among working youths in an IOT environment: A design thinking process for solution. In 2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS) (pp. 1-6). IEEE. DOI: 10.1109/ICRIIS48246.2019.9073644.

Elbes, M., Hendawi, S., Alzu'bi, S., Kanan, T., & Mughaid, A. (2023). Unleashing the full potential of artificial intelligence and machine learning in cybersecurity vulnerability management. In 2023 International Conference on Information Technology (ICIT) (pp. 276-283). IEEE. DOI: 10.1109/ICIT58056.2023.10225910.

Friha, O., Ferrag, M. A., Maglaras, L., & Shu, L. (2022). Digital agriculture security: aspects, threats, mitigation strategies, and future trends. IEEE Internet of Things Magazine, 5(3), 82-90. DOI: 10.1109/IOTM.001.2100164.

Geluvaraj, B., Satwik, P. M., & Kumar, T. A. A. (2019). The Future of cybersecurity: major role of artificial intelligence, machine learning, and deep learning in cyberspace. In International Conference on Computer Networks and Communication Technologies: ICCNCT 2018 (pp. 739-747). Springer Singapore. DOI: 10.1007/978-981-10-8681-6_67.

George, H., & Arnett, A. (2021). Implementing Cybersecurity Best Practices for Electrical Infrastructure in a Refinery: A Case Study. IEEE Industry Applications Magazine, 27(4), 18-24. DOI: 10.1109/MIAS.2021.3063095.

Gordon, L. A., Loeb, M. P., & Zhou, L. (2020). Integrating cost-benefit analysis into the NIST Cybersecurity Framework via the Gordon-Loeb Model. Journal of Cybersecurity, 6(1), 005. https://doi.org/10.1093/cybsec/tyaa005.

Hongbo, G.U.O., & Tinmaz, H. (2023). A survey on college students’ cybersecurity awareness and education from the perspective of China. Journal for the Education of Gifted Young Scientists, 11(3), 351-367. DOI: 10.17478/jegys.1323423.

Ihsan, S.N., Abd Kadir, T. A., Ismail, N.I., K. Yuan, K.Z., & Jie, Y.S. (2023). Implementation of Serious Games for Data Privacy and Protection Awareness in Cybersecurity. In 2023 IEEE 8th International Conference on Software Engineering and Computer Systems (ICSECS), Penang, Malaysia (pp. 330-335). DOI: 10.1109/ICSECS58457.2023.10256329.

Jacuch, A. (2021). Comparative analysis of cybersecurity strategies: European union strategy and policies, Polish and selected countries' strategies. Online Journal Modelling the New Europe, (37), 102-120. DOI: 10.24193/ojmne.2021.37.06.

Kadena, E., & Gupi, M. (2021). Human factors in cybersecurity: risks and impacts. Security Science Journal, 51-64. DOI: https://doi.org/10.37458/ssj.2.2.3.

Lee, I. (2020). Internet of Things (IoT) cybersecurity: Literature review and IoT cyber risk management. Future Internet, 12(9), 157. https://doi.org/10.3390/fi12090157.

Malik, A. A., & Tosh, D. K. (2020). Quantitative Risk Modeling and Analysis for Large-Scale Cyber-Physical Systems. In 2020 29th International Conference on Computer Communications and Networks (ICCCN) (pp. 1-6). IEEE. DOI: 10.1109/ICCCN49398.2020.9209654.

Marotta, A., & Madnick, S. (2020). Analyzing the interplay between regulatory compliance and cybersecurity (Revised). Working Paper CISL# 2020-15. DOI: 10.2139/ssrn.3569902.

Marotta, A., & Madnick, S. (2020). Tackling Cybersecurity Regulatory Challenges: A Proposed Research Framework. In Workshop on E-Business (pp. 12-24). Cham: Springer International Publishing. DOI: 10.1007/978-3-030-79454-5_2.

Meltzer, J. P. (2020). Cybersecurity, digital trade, and data flows: re-thinking a role for international trade rules. Global Economy & Development WP, 132. DOI: 10.2139/ssrn.3595175.

Mijwil, M. M., Unogwu, O. J., Filali, Y., Bala, I., & Al-Shahwani, H. (2023). Exploring the top five evolving threats in cybersecurity: an in-depth overview. Mesopotamian Journal of Cybersecurity, 2023, 57-63. DOI: 10.58496/mjcs/2023/010.

Rahul Kalva. Revolutionizing healthcare cybersecurity a generative AI-Driven MLOps framework for proactive threat detection and mitigation, World Journal of Advanced Research and Reviews, v. 13, n. 3, p. 577-582, 2022.

Ankush Reddy Sugureddy. Enhancing data governance frameworks with AI/ML: strategies for modern enterprises. International Journal of Data Analytics (IJDA), 2(1), 2022, pp. 12-22.

Ankush Reddy Sugureddy. Utilizing generative AI for real-time data governance and privacy solutions. International Journal of Artificial Intelligence & Machine Learning (IJAIML), 1(1), 2022, pp. 92-101.

Sudeesh Goriparthi. Leveraging AIML for advanced data governance enhancing data quality and compliance monitoring. International Journal of Data Analytics (IJDA), 2(1), 2022, pp. 1-11

Sudeesh Goriparthi. Implementing robust data governance frameworks: the role of AI/ML in ensuring data integrity and compliance. International Journal of Artificial Intelligence & Machine Learning (IJAIML), 1(1), 2022, pp. 83-91.

Rahul Kalva. Leveraging Generative AI for Advanced Cybersecurity Enhancing Threat Detection and Mitigation in Healthcare Systems, European Journal of Advances in Engineering and Technology, v. 10, n. 9, p. 113-119, 2023.

Ankush Reddy Sugureddy. AI-driven solutions for robust data governance: A focus on generative ai applications. International Journal of Data Analytics (IJDA), 3(1), 2023, pp. 79-89

Ankush Reddy Sugureddy. Enhancing data governance and privacy AI solutions for lineage and compliance with CCPA, GDPR. International Journal of Artificial Intelligence & Machine Learning (IJAIML), 2(1), 2023, pp. 166-180

Sudeesh Goriparthi. Optimizing search functionality: A performance comparison between solr and elasticsearch. International Journal of Data Analytics (IJDA), 3(1), 2023, pp. 67-78.

Sudeesh Goriparthi. Tracing data lineage with generative AI: improving data transparency and compliance. International Journal of Artificial Intelligence & Machine Learning (IJAIML), 2(1), 2023, pp. 155-165.

Downloads

Published

11.10.2024

How to Cite

Sneha Gogineni. (2024). Assessing Organizational Cybersecurity Resilience a Holistic Approach to Threat Vector Analysis in Risk Management. International Journal of Intelligent Systems and Applications in Engineering, 12(23s), 2237 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7326

Issue

Section

Research Article