Robotic Process Automation in Cyber Security Operations: Optimizing Workflows with AI-Driven Automation
Main Article Content
Abstract
It is very important for today's safety that a Domain-based Message Authentication, Reporting, and Conformance (DMARC) system is set up correctly. This outline sums up the main points of a thorough study that looked at many aspects of DMARC application. The goal was to find a good mix between strong email security and the smooth flow of official communications. The review looks at important factors like email delivery rates, spam protection, false positives, DMARC policy enforcement, alignment success, and issue reaction times. It does this through categorized tables. Collectively, these measures show how complicated DMARC execution is, stressing the need for a complete method. In addition to looking at how well the technology works technically, the study also looks at how well it works for people by looking at things like user education, knowledge, and the cost of implementation. All of these things work together in a complex way to make the system last and be successful overall. The strategic benefits of a well-run DMARC project are shown by the wider effects it has on brand image, return on investment, and customer trust. The results affect more than just safety; they also affect the company's reputation and ability to survive in a tough business world. In conclusion, the evaluation tables are useful tools that help businesses improve and tweak their email security plans. A good DMARC strategy not only protects against online dangers but also builds a culture of knowledge, trust, and organizational excellence. This sets the organization up for long-term success in a digital world that is always changing.
Article Details
![Creative Commons License](http://i.creativecommons.org/l/by-nd/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
References
Yazdinejad, A. Bohlooli, and K. Jamshidi, “Efficient design and hardware implementation of the openflow v1. 3 switch on the virtex-6 fpgaml605,” The Journal of Supercomputing, vol. 74, no. 3, pp. 1299–1320, 2018.
CyberArk Software, “What is Robotic Process Automation (RPA)? - Definition,” 9 2021.
A. Yazdinejad, R. M. Parizi, A. Dehghantanha, Q. Zhang, and K.-K. R. Choo, “An energy-efficient sdn controller architecture for iot networks with blockchain-based security,” IEEE Transactions on Services Computing, vol. 13, no. 4, pp. 625–638, 2020.
Limkar, Suresh, Ashok, Wankhede Vishal, Singh, Sanjeev, Singh, Amrik, Wagh, Sharmila K. & Ajani, Samir N.(2023) A mechanism to ensure identity-based anonymity and authentication for IoT infrastructure using cryptography, Journal of Discrete Mathematical Sciences and Cryptography, 26:5, 1597–1611
Ajani, S. N. ., Khobragade, P. ., Dhone, M. ., Ganguly, B. ., Shelke, N. ., & Parati, N. . (2023). Advancements in Computing: Emerging Trends in Computational Science with Next-Generation Computing. International Journal of Intelligent Systems and Applications in Engineering, 12(7s), 546–559.
Morzelona, R. (2021). Human Visual System Quality Assessment in The Images Using the IQA Model Integrated with Automated Machine Learning Model . Machine Learning Applications in Engineering Education and Management, 1(1), 13–18. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/5
A. Yazdinejad, A. Dehghantanha, R. M. Parizi, M. Hammoudeh, H. Karimipour, and G. Srivastava, “Block hunter: Federated learning for cyber threat hunting in blockchain-based iiot networks,” IEEE Transactions on Industrial Informatics, 2022.
Yazdinejad, A. Dehghantanha, R. M. Parizi, G. Srivastava, and H. Karimipour, “Secure intelligent fuzzy blockchain framework: Effective threat detection in iot networks,” Computers in Industry, vol. 144, p. 103801, 2023.
S. Agostinelli, M. Mecella, G. Amato, and C. Gennaro, “Synthesis of strategies for robotic process automation.,” in SEBD, 2019.
Ajani, S. N. ., Potnurwar, P. V. ., Bongirwar, V. K. ., Potnurwar, A. V. ., Joshi, A. ., & Parati, N. . (2023). Dynamic RRT* Algorithm for Probabilistic Path Prediction in Dynamic Environment. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 263–271.
Himangi, Prof. (Dr.) Mukesh Singla. (2023). Optimizing the Failure Prediction in Deep Learning. International Journal of New Practices in Management and Engineering, 11(01), 61–67. Retrieved from https://www.ijnpme.org/index.php/IJNPME/article/view/195
Khetani, V. ., Gandhi, Y. ., Bhattacharya, S. ., Ajani, S. N. ., & Limkar, S. . (2023). Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains. International Journal of Intelligent Systems and Applications in Engineering, 11(7s), 253–262.
A. Vaseashta, “Applying resilience to hybrid threats in infrastructure, digital, and social domains using multisectoral, multidisciplinary, and wholeof-government approach,” in Building Cyber Resilience against Hybrid Threats, pp. 42–59, IOS Press, 2022.
K. Murugappan and T. Sree Kala, “An enhanced security framework for robotic process automation,” in Cyber Security and Digital Forensics (K. Khanna, V. V. Estrela, and J. J. P. C. Rodrigues, eds.), (Singapore), pp. 231–238, Springer Singapore, 2022.
A. Yazdinejad, B. Zolfaghari, A. Dehghantanha, H. Karimipour, G. Srivastava, and R. M. Parizi, “Accurate threat hunting in industrial internet of things edge devices,” Digital Communications and Networks, 2022.
M. Alfandi and S. U. Se¸ckiner, “Robotic process automation: A literature review on quantitative benefits,”
“RPA Security Best Practices: Balancing Digital Transformation While Managing RPA Security Risks,” 3 2021.
A. Yazdinejad, R. M. Parizi, A. Dehghantanha, H. Karimipour, G. Srivastava, and M. Aledhari, “Enabling drones in the internet of things with decentralized blockchain-based security,” IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6406–6415, 2020.
A. Yazdinejad, R. M. Parizi, A. Dehghantanha, and K.-K. R. Choo, “Blockchain-enabled authentication handover with efficient privacy protection in sdn-based 5g networks,” IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp. 1120–1132, 2019.
A. Yazdinejad, R. M. Parizi, A. Dehghantanha, and K.-K. R. Choo, “P4-toblockchain: A secure blockchain-enabled packet parser for software defined networking,” Computers & Security, vol. 88, p. 101629, 2020.
] A. Yazdinejad, M. Kazemi, R. M. Parizi, A. Dehghantanha, and H. Karimipour, “An ensemble deep learning model for cyber threat hunting in industrial internet of things,” Digital Communications and Networks, 2022.