You are on page 1of 9

DATA ANALYTICS TOOLS IN CYBERSECURITY

A Case Study Project

for the subject

Information Assurance Security

by

Khemberly Oriel Abulencia

Jo Margareth Banag

Shiela Mae Concepcion

Cyber Jorge Deris

Christine Joy Estrada

Tristan Mark Garcia

Riven Matunan

Jayson Perdigon

Mr. John Salongga


Adviser
TABLE OF CONTENTS

Page

Title Page

Introduction

Literature Review

2.1 Background of the Study

2.2 Cybersecurity and Data Analytics

2.3 Assets Affected in Cybersecurity

Conclusion

References
Introduction

The globe is more vulnerable to a wide range of cyber threats as it grows more

interconnected. To become knowledgeable about and comprehend the changing threat

landscape, we must employ a variety of tools and strategies. Data serves as a common

thread connecting different kinds of end users and devices. We can better comprehend

risks, stop cyberattacks in the future, and gain insight into the changing cyber threat

landscape by analyzing data from many cybersecurity domain segments, especially

data created during cyberattacks. Data analytics is known as applying appropriate

analysis to ensure correct data analysis, cleansing, alteration, and modeling. Data

analysis produces a favorable result and helps uncover significant nuances. If the

cybercrime data is thoroughly analyzed, the investigation could be completed quickly,

enabling better decisions to be made about using the relevant legislation to battle

cybercriminals. Sometimes, a presentation that only covers computers and the internet

is mistaken for cybercrime.

In today's interconnected world, cybersecurity is essential to fending off

dangers that impact people, businesses, and governments alike. Cybersecurity

solutions must address new issues in sensor networks, user devices, industrial control

systems, and computer networks, in addition to the acceptability and use of

technology on a variety of atypical devices. The unifying factor across all these

different kinds of devices and end users is data, particularly data produced during

cyberattacks. The focus of cybersecurity is increasingly moving toward prospective as

well as retrospective data analysis across many cybersecurity areas. This data-driven
understanding of attacks has the ability to stop cyberattacks in the future and offer

insights into how cyber threats are changing.

Literature Review

2.1. Background of the Study

Although data analytics and cybersecurity are two different areas of

technology, they can work together to improve cyber securitization procedures if that

is what is intended. These days, data analytics are crucial to contemporary

cybersecurity procedures. Organizations can adopt a data-driven securitization

strategy and move beyond perimeter-based security measures by leveraging data

analytics in cybersecurity. Data analytics is the process of deconstructing, organizing,

processing, and manipulating unprocessed data in order to gain insights that support

businesses in making more informed decisions based on data. A vast array of

approaches and procedures are used in the vast discipline of data analytics to extract

patterns, trends, correlations, and other important information from massive

databases. These days, businesses in all sectors use data analytics to help them solve

complicated issues, make data-driven choices, and streamline their processes.

Prioritized warnings, automated threat intelligence, proactive incident detection, and

enhanced forensic incident investigation are some advantages of cybersecurity

analytics solutions.

2.2. Cybersecurity and Data Analytics

Cybercrime is defined as an offense where a computer or other device is used

as a vector to attack another system with the intention of gaining unauthorized access

to data or sabotaging the device. Other actions like fraud, identity theft, and system
suspension may also be involved. After that, attackers extort the victim for money,

which can cause significant losses for businesses. The majority of data is now cyber-

oriented and stored on the internet, making it the most susceptible to cybercrime. For

this reason, it is imperative to establish cybersecurity policies. It is essential to

examine cybersecurity trends in light of the allocated work. Web servers have been

shown to be a highly vulnerable target for cyberattacks. Attackers must first be

diagnosed since they use compromised servers to distribute their dangerous code and

tactics. Data analytics refers to the analysis of data with processing capability that is

limited by application and exceeds that of traditional databases. In this instance, there

is too much data being produced too quickly, making it impossible to handle.

2.3. Assets Affected in Cybersecurity

Cybersecurity is protecting priceless electronic assets and tangible assets with

electronic access from unwanted access. These resources could comprise, among

other things, information assets, networked devices, personal gadgets, and

infrastructure. Cybersecurity pertains to safeguarding against potential dangers, which

are sometimes known as cyberattacks or cyber threats. Cybersecurity, which means

that security is compromised to obtain valuable assets, is known as a cyberattack.

Preventing cyberattacks on vital assets is cybersecurity’s primary goal. Threat

detection is the second goal of cybersecurity. The fourth goal is to recover and return

the system to its regular condition in the event that an assault is successful. The third

goal is to respond to threats should they get access to vital assets. In order to prevent,

identify, and respond to attacks on vital assets, cybersecurity is achieved by

addressing each of these three factors. In essence, it deals with protecting anything

online to prevent tampering with these valuable assets.


The risk of harm makes cybersecurity a significant challenge. Theft of an

empty hard disk is one thing; the importance of the data saved on a hard drive makes

it far more dangerous when data is accessed without authorization. An unintentional

malfunction of a sensor that regulates a chemical flow into a vat could result in a

hazmat incident, but authorized access that compromises the program in charge of the

sensor poses a cybersecurity risk. This is due to the fact that tampering’s aim and

scope are uncontrollable and could have far worse consequences than a

malfunctioning sensor. Therefore, the goal of cybersecurity is to stop unwanted access

to both physical assets and technological assets.


Conclusion
References

Shivashankar H. et-al. (21 November 2023). A New Approach to Data Analysis Using

Machine Learning for Cybersecurity. Retrieved from: https://www.mdpi.com/2504-

2289/7/4/176

(10 August 2023). Ironhack - Changing The Future of Tech Education.

Retrieved from: https://www.ironhack.com/gb/blog/the-role-of-data-analytics-in-

cybersecurity

Khan, S., Olivia, T.S.L., Khan, N., Why, N.K. & Tan, S. W. (2022). Data analytic for

cyber security: a review of current framework solutions, challenges and trends. The

Eurasia Proceedings of Science, Technology, Engineering & Mathematics (EPSTEM),

18, 1-6. Retrieved from http://www.epstem.net/en/pub/issue/72857/1182628


Vandana J. (August 2022). Data Analytics for Cybersecurity. Retrieved from:

https://www.cambridge.org/core/books/data-analytics-for-cybersecurity/

26930118ECA3DD8EDED4DACA97997439#

You might also like