Data Analysis On Cybersecurity Compliancee
Data Analysis On Cybersecurity Compliancee
Data Analysis On Cybersecurity Compliancee
INTRODUCTION
with malicious intent every day (Mousa et al,2020). Web-based platforms are
routinely targeted by attackers due to the vast amount of data and control
they offer (Pevnev & Kapchynskyi, 2018). The confidentiality, integrity, and
Michael, 2017; Perwej etal, 2021). Alexander (2015) claims that cyber threats
cover a wide range of risks, including targeted attacks, malware, spam, abuse
1
The necessity of protecting the networks and systems on which we rely has
al,2019; Tech Georgia, 2016). The advent of big data platforms and machine
knowledge discovery and data science (Zhou et al, 2017). These developments
et al, 2017). Big data analytics provides a platform for organizations to uncover
capabilities (Zuech et al, 2015). By utilizing big data tools and techniques, cyber
(Bose et al, 2017). Additionally, visualization tools are utilized to easily identify
2
compliance status accurately. By leveraging advanced analytics techniques,
can gain deeper insights into their compliance posture, identify potential
measures.
reduce cyber risks, the development of new threat landscapes has rendered
actors prevalent in today's digital ecosystem, as noted by Ernst & Young (2015),
error-prone, and impractical, especially given the sheer volume and complexity
of the data (Lee, 1999). Extracting meaningful insights from this data requires
advanced data analysis techniques that can handle large-scale data processing,
3
advanced analytics techniques, organizations can gain deeper insights into
The primary objective of this thesis was to develop a method for Data Analysis
forecasting cyberattacks.
4
methodologies to simplify compliance assessment and help organizations meet
organizations can gain deeper insights into their compliance status, identify
5
Additionally, the research project bridges the gap between compliance
provide guidelines for security controls, they often lack specific guidance on
how to analyze compliance data effectively. By filling this gap, the study offers
standards, and the research findings can inform the refinement of existing
accurately.
cybersecurity posture.
6
Lastly, the study has practical implications for various stakeholders, including
information, protect individuals' privacy, and reduce the risk of data breaches.
7
REFERENCES
Ahmed, E., Yaqoob, I., Hashem, I. A. T., Khan, I., Ahmed, A. I. A., Imran, M., &
https://doi.org/10.1016/j.comnet.2017.06.013
Bilge, L., Balzarotti, D., Robertson, W., Kirda, E., & Kruegel, C. (2012, December).
ares2014.html#Boehmer14
8
Böse, B., Avasarala, B., Tirthapura, S., Chung, Y. Y., & Steiner, D. (2017).
Ernst and Young. (2015). Using cyber analytics to help you get on top of
http://www.ey.com/Publication/vwLUAssets/ey-third-generation-security-
operations-centers-2015/$FILE/ey-third-generation-security-operations-centers-
2015.pdf
Lee, W. (1999). A data mining framework for constructing features and models
Meng, X.F., Ma, C.H. and Yang, C. (2019). Review of Machine Learning Web based
from https://threatpost.com/few-victims-reporting-ransomware-attacks-to-fbi/
126510/
9
Mousa A., Karabatak M., & Mustafa T. (2020). Web based Security Threats and
(ISDFS), 1-5.
Nica E., Tudorica B. G., Dusmanescu D. M., Popescu G., & Breaz A. M. (2019).
Web based Security Issues - A Short Analysis on the Emergent Security Problems
https://doi.org/10.24818/18423264/53.3.19.07.
Perwej, Y., Abbas, S. Q., Dixit, J. P., Akhtar, N., & Jaiswal, A. K. (2021). A
Pevnev V., & Kapchynskyi S.(2018). Web based Security, Threats and Preventive
https://doi.org/10.20998/25229052.2018.1.13
Zhou, L., Pan, S., Wang, J., & Vasilakos, A. V. (2017). Machine learning on big
Zuech, R., Khoshgoftaar, T. M., & Wald, R. (2015). Intrusion detection and big
10
11