Ias101 Research Paper
Ias101 Research Paper
Ias101 Research Paper
by
Jo Margareth Banag
Riven Matunan
Jayson Perdigon
Page
Title Page
Introduction
Literature Review
Conclusion
References
Introduction
The globe is more vulnerable to a wide range of cyber threats as it grows more
landscape, we must employ a variety of tools and strategies. Data serves as a common
thread connecting different kinds of end users and devices. We can better comprehend
risks, stop cyberattacks in the future, and gain insight into the changing cyber threat
analysis to ensure correct data analysis, cleansing, alteration, and modeling. Data
analysis produces a favorable result and helps uncover significant nuances. If the
enabling better decisions to be made about using the relevant legislation to battle
cybercriminals. Sometimes, a presentation that only covers computers and the internet
solutions must address new issues in sensor networks, user devices, industrial control
technology on a variety of atypical devices. The unifying factor across all these
different kinds of devices and end users is data, particularly data produced during
well as retrospective data analysis across many cybersecurity areas. This data-driven
understanding of attacks has the ability to stop cyberattacks in the future and offer
Literature Review
technology, they can work together to improve cyber securitization procedures if that
processing, and manipulating unprocessed data in order to gain insights that support
approaches and procedures are used in the vast discipline of data analytics to extract
databases. These days, businesses in all sectors use data analytics to help them solve
analytics solutions.
as a vector to attack another system with the intention of gaining unauthorized access
to data or sabotaging the device. Other actions like fraud, identity theft, and system
suspension may also be involved. After that, attackers extort the victim for money,
which can cause significant losses for businesses. The majority of data is now cyber-
oriented and stored on the internet, making it the most susceptible to cybercrime. For
examine cybersecurity trends in light of the allocated work. Web servers have been
diagnosed since they use compromised servers to distribute their dangerous code and
tactics. Data analytics refers to the analysis of data with processing capability that is
limited by application and exceeds that of traditional databases. In this instance, there
is too much data being produced too quickly, making it impossible to handle.
electronic access from unwanted access. These resources could comprise, among
detection is the second goal of cybersecurity. The fourth goal is to recover and return
the system to its regular condition in the event that an assault is successful. The third
goal is to respond to threats should they get access to vital assets. In order to prevent,
addressing each of these three factors. In essence, it deals with protecting anything
empty hard disk is one thing; the importance of the data saved on a hard drive makes
malfunction of a sensor that regulates a chemical flow into a vat could result in a
hazmat incident, but authorized access that compromises the program in charge of the
sensor poses a cybersecurity risk. This is due to the fact that tampering’s aim and
scope are uncontrollable and could have far worse consequences than a
Shivashankar H. et-al. (21 November 2023). A New Approach to Data Analysis Using
2289/7/4/176
cybersecurity
Khan, S., Olivia, T.S.L., Khan, N., Why, N.K. & Tan, S. W. (2022). Data analytic for
cyber security: a review of current framework solutions, challenges and trends. The
https://www.cambridge.org/core/books/data-analytics-for-cybersecurity/
26930118ECA3DD8EDED4DACA97997439#