CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Advancing Cybersecurity Strategies: A Holistic Exploration of Operations, Data Systems, and Machine Intelligence

by Akm Hasan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 12
Year of Publication: 2024
Authors: Akm Hasan
10.5120/ijca2024923476

Akm Hasan . Advancing Cybersecurity Strategies: A Holistic Exploration of Operations, Data Systems, and Machine Intelligence. International Journal of Computer Applications. 186, 12 ( Mar 2024), 12-16. DOI=10.5120/ijca2024923476

@article{ 10.5120/ijca2024923476,
author = { Akm Hasan },
title = { Advancing Cybersecurity Strategies: A Holistic Exploration of Operations, Data Systems, and Machine Intelligence },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2024 },
volume = { 186 },
number = { 12 },
month = { Mar },
year = { 2024 },
issn = { 0975-8887 },
pages = { 12-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number12/advancing-cybersecurity-strategies-a-holistic-exploration-of-operations-data-systems-and-machine-intelligence/ },
doi = { 10.5120/ijca2024923476 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-03-23T00:18:14+05:30
%A Akm Hasan
%T Advancing Cybersecurity Strategies: A Holistic Exploration of Operations, Data Systems, and Machine Intelligence
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 12
%P 12-16
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This research paper offers a comprehensive exploration of cybersecurity strategies implemented at Hays, with a focus on critical domains, including Information Security Management System (ISMS), Cybersecurity Operations, and Incident Response Management. Embracing the dynamic landscape of cybersecurity, our study delves into Machine Intelligence, Data and Information Systems, and Digital Forensics, addressing the evolving challenges faced by modern enterprises. Drawing on the author's extensive experience in the British Armed Forces and enriched by a Harvard education, the paper navigates the intricate realms of cybersecurity, providing valuable insights into cutting-edge practices for global IT security.

References
  1. According to Hays Global Cyber and InfoSec Strategy (2022),” Akm Hasan, an author of the ”Hays Global Cyber and InfoSec Strategy,” published internally and also at https://www.hays.co.uk/ and https://github.com/AkmHasan/Hays-Global-Cyber-InfoSec-Strategy/blob/main/Hays%20Global%20Cyber%20%26%20InfoSec%20Strategy%20-%20For%20the%20C-Suite.pdf
  2. According to Hays ISMS Policy, Nigel Gray, “Hays ISMS Policy,” published at Hays internally for 33 counties in Hays world, and also at https://www.hays.co.uk/
  3. According to Harvard’s final project, Akm Hasan, ”Harvard Advanced Cybersecurity and Risk Management Project,” achieved at Harvard University’s e-library at https://www.harvard.edu/ and published at https://github.com/AkmHasan/Harvard-Final-Project-/blob/main/Final%20_Project-AKM%20HASAN.pdf
  4. According to the Hays’ ISMS team’s function, “Information Security Management System” at www.hays.com
  5. According to the MSc final Project at Coventry University from HAYS Technology,” achieved at Coventry University’s e-library at https://www.coventry.ac.uk/ and published at https://github.com/AkmHasan/MSc-Research-Project-Information-Security-Management-System-ISMS-of-Hays-Central-Services-IT/blob/main/Master%20of%20Science%2C%20Individual%20Research%20Project_ISMS_of%20Hays%20Central%20Services%20IT.pdf
  6. According to the British Armed Forces Operational IT and Cyber Capabilities at https://www.army.mod.uk/
  7. Based on the Industry Standards – ISO at https://www.iso.org/home.html
  8. Based on the NIST at https://www.nist.gov/
  9. According to the CyberEdBoard Community Appointment (July 2023) at https://cyberedboard.io/
  10. Based on PWC - External Audit Services at https://www.pwc.co.uk/
  11. Based on KPMG - External Audit Services at https://kpmg.com/uk/en/home.html
  12. According to Wild, Peter. ”How Airline Business Models Impact Working Conditions of Flight Crew Members.” Aeronautics and Aerospace Open Access Journal, 2022, https://doi.org/10.15406/aaoaj.2022.06.00147.technology — 4freepeople.com and https://4freepeople.com/tag/technology/
  13. Internal and External auditing section according to Hyas’ auditing system and https://www.deskera.com/industries/manufacturing/
  14. Risk Assessment and Risk Management according to Hays’ regional and global Risk Management Matrix and https://silveroakauditing.com/risk-management-services-in-dubai/
Index Terms

Computer Science
Information Sciences

Keywords

Cybersecurity Strategy Information Security Management Incident Response Framework Global Collaboration in Cybersecurity Diagram Integration in Cybersecurity Machine Intelligence in Security