Author
Abstract
The digital metamorphosis period has unnaturally altered cybersecurity paradigms, challenging a shift from reactive defense mechanisms to visionary, intelligence-driven security fabrics. Contemporary trouble geographies encompass expanded attack shells through Internet of effects proliferation, pall relinquishment, and distributed pool models that challenge traditional border-grounded security infrastructures. Data analytics technologies, including Extended Discovery and Response systems, machine learning algorithms, Edge artificial intelligence, and Zero Trust Architecture executions, demonstrate substantial functional effectiveness in trouble discovery, response time reduction, and scalability across distributed computing environments. Healthcare and fiscal sectors show transformative advancements through behavioral analytics and anomaly discovery systems, while cost-benefit evaluations reveal compelling, profitable advantages for visionary security investments over reactive incident response models. Still, advanced cybersecurity executions raise significant ethical concerns regarding surveillance overreach, algorithmic bias in automated decision-making systems, and nonsupervisory compliance challenges across multiple authorities. Balancing security effectiveness with sequestration preservation requires sophisticated, specialized results incorporating sequestration-enhancing technologies while maintaining acceptable trouble discovery capabilities. The elaboration toward intelligent cyber defense systems represents an abecedarian metamorphosis in organizational security postures, demanding careful consideration of technological capabilities, functional conditions, and ethical scores in increasingly connected digital surroundings.
Suggested Citation
Mani Sai Kamal Darla, 2025.
"Data Analytics in Information Security: Enabling Intelligent Cyber Defense,"
International Journal of Computing and Engineering, CARI Journals Limited, vol. 7(13), pages 11-22.
Handle:
RePEc:bhx:ojijce:v:7:y:2025:i:13:p:11-22:id:2994
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bhx:ojijce:v:7:y:2025:i:13:p:11-22:id:2994. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://www.carijournals.org/journals/index.php/IJCE/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.