EconPapers    
Economics at your fingertips  
 

Data Analytics in Information Security: Enabling Intelligent Cyber Defense

Mani Sai Kamal Darla ()

International Journal of Computing and Engineering, 2025, vol. 7, issue 13, 11 - 22

Abstract: The digital metamorphosis period has unnaturally altered cybersecurity paradigms, challenging a shift from reactive defense mechanisms to visionary, intelligence-driven security fabrics. Contemporary trouble geographies encompass expanded attack shells through Internet of effects proliferation, pall relinquishment, and distributed pool models that challenge traditional border-grounded security infrastructures. Data analytics technologies, including Extended Discovery and Response systems, machine learning algorithms, Edge artificial intelligence, and Zero Trust Architecture executions, demonstrate substantial functional effectiveness in trouble discovery, response time reduction, and scalability across distributed computing environments. Healthcare and fiscal sectors show transformative advancements through behavioral analytics and anomaly discovery systems, while cost-benefit evaluations reveal compelling, profitable advantages for visionary security investments over reactive incident response models. Still, advanced cybersecurity executions raise significant ethical concerns regarding surveillance overreach, algorithmic bias in automated decision-making systems, and nonsupervisory compliance challenges across multiple authorities. Balancing security effectiveness with sequestration preservation requires sophisticated, specialized results incorporating sequestration-enhancing technologies while maintaining acceptable trouble discovery capabilities. The elaboration toward intelligent cyber defense systems represents an abecedarian metamorphosis in organizational security postures, demanding careful consideration of technological capabilities, functional conditions, and ethical scores in increasingly connected digital surroundings.

Keywords: Data Analytics; Cybersecurity; Extended Detection Response; Machine Learning; Zero Trust Architecture (search for similar items in EconPapers)
Date: 2025
References: Add references at CitEc
Citations:

Downloads: (external link)
https://carijournals.org/journals/index.php/IJCE/article/view/2994 (application/pdf)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:bhx:ojijce:v:7:y:2025:i:13:p:11-22:id:2994

Access Statistics for this article

More articles in International Journal of Computing and Engineering from CARI Journals Limited
Bibliographic data for series maintained by Chief Editor ().

 
Page updated 2025-07-24
Handle: RePEc:bhx:ojijce:v:7:y:2025:i:13:p:11-22:id:2994