Proactive cyber threat mitigation: Integrating data-driven insights with user-centric security protocols DOI Creative Commons

Kingsley David Onyewuchi Ofoegbu,

Olajide Soji Osundare,

Chidiebere Somadina Ike

и другие.

Computer Science & IT Research Journal, Год журнала: 2024, Номер 5(8), С. 2083 - 2106

Опубликована: Авг. 31, 2024

In the rapidly evolving cybersecurity landscape, proactive threat mitigation has become essential for protecting sensitive data and systems from increasingly sophisticated attacks. The paper explores a holistic approach to enhancing by merging data-driven insights with user-centric security practices. This study highlights limitations of traditional reactive measures advocates shift towards strategy that anticipates addresses potential threats before they materialize. research emphasizes importance leveraging analytics gain actionable into vulnerabilities emerging threats. By analyzing large datasets network traffic, user behavior, historical incidents, organizations can identify patterns anomalies signal risks. These enable development more effective detection predictive models enhance an organization’s ability respond swiftly cyber addition analytics, underscores significance integrating protocols. Traditional often overlook human element, which be critical factor in both efficacy overall risk profile. User-centric protocols focus on awareness, implementing tailored training, promoting best practices cybersecurity. ensures are not only technologically sound but also aligned behavior needs, reducing error improving posture. discusses practical implementation strategies combining protocols, including use advanced tools, continuous education, adaptive frameworks. Case studies demonstrate benefits this integrated approach, such as improved rates, reduced incident response times, enhanced resilience. conclusion, presents comprehensive framework mitigation, emphasizing synergy between robust safeguarding against modern Keywords: Cyber Threat, Proactive, Data-Driven, User-Centric, Security Protocols

Язык: Английский

A Digital Transformation Framework for U.S. E-Commerce Supply Chains DOI Open Access

Oluwakemi Famoti,

Bamidele Michael Omowole,

Godwin Nzeako

и другие.

International Journal of Scientific Research in Computer Science Engineering and Information Technology, Год журнала: 2025, Номер 11(1), С. 1670 - 1701

Опубликована: Фев. 7, 2025

The rapid advancement of digital technologies has transformed industries worldwide, with U.S. e-commerce supply chains being no exception. This concept paper presents a comprehensive framework for transformation within chains, aiming to enhance efficiency, resilience, and scalability in an increasingly competitive market. outlines the integration cutting-edge technologies, including artificial intelligence (AI), blockchain, Internet Things (IoT), big data analytics, optimize key chain operations such as inventory management, logistics, demand forecasting, customer service. identifies critical challenges face, fragmented systems, inefficiencies real-time decision-making, vulnerabilities external disruptions. To address these challenges, proposes phased approach transformation, prioritizing automation, integration, analytics. It emphasizes importance adopting cloud-based solutions enhanced collaboration between suppliers, distributors, retailers. In addition technological solutions, highlights role human capital driving successful calling upskilling reskilling initiatives prepare workforce data-driven technology-enabled environment. also considers regulatory cybersecurity aspects offering strategies ensuring compliance protecting sensitive from cyber threats. By implementing this framework, businesses can achieve higher levels operational reduced costs, improved satisfaction. serves roadmap companies navigate evolving landscape, ultimately positioning sustained growth advantage global

Язык: Английский

Процитировано

0

Proactive cyber threat mitigation: Integrating data-driven insights with user-centric security protocols DOI Creative Commons

Kingsley David Onyewuchi Ofoegbu,

Olajide Soji Osundare,

Chidiebere Somadina Ike

и другие.

Computer Science & IT Research Journal, Год журнала: 2024, Номер 5(8), С. 2083 - 2106

Опубликована: Авг. 31, 2024

In the rapidly evolving cybersecurity landscape, proactive threat mitigation has become essential for protecting sensitive data and systems from increasingly sophisticated attacks. The paper explores a holistic approach to enhancing by merging data-driven insights with user-centric security practices. This study highlights limitations of traditional reactive measures advocates shift towards strategy that anticipates addresses potential threats before they materialize. research emphasizes importance leveraging analytics gain actionable into vulnerabilities emerging threats. By analyzing large datasets network traffic, user behavior, historical incidents, organizations can identify patterns anomalies signal risks. These enable development more effective detection predictive models enhance an organization’s ability respond swiftly cyber addition analytics, underscores significance integrating protocols. Traditional often overlook human element, which be critical factor in both efficacy overall risk profile. User-centric protocols focus on awareness, implementing tailored training, promoting best practices cybersecurity. ensures are not only technologically sound but also aligned behavior needs, reducing error improving posture. discusses practical implementation strategies combining protocols, including use advanced tools, continuous education, adaptive frameworks. Case studies demonstrate benefits this integrated approach, such as improved rates, reduced incident response times, enhanced resilience. conclusion, presents comprehensive framework mitigation, emphasizing synergy between robust safeguarding against modern Keywords: Cyber Threat, Proactive, Data-Driven, User-Centric, Security Protocols

Язык: Английский

Процитировано

1