The Use of Automated Techniques in Cybersecurity Operations: Supporting Threat Detection and Information Assurance in Modern Information Systems

Authors

  • Minh Tran Can Tho University, 3/2 Street, Ninh Kieu District, Can Tho, Vietnam Author
  • Ha Nguyen Quy Nhon University, An Duong Vuong Street, Quy Nhon City, Vietnam Author

Abstract

The proliferation of digital infrastructure and interconnected systems has fundamentally transformed the cybersecurity landscape, creating unprecedented challenges in threat detection and response capabilities. This research examines the integration of automated techniques in cybersecurity operations, focusing on their role in enhancing threat detection mechanisms and strengthening information assurance frameworks within modern information systems. The study analyzes the mathematical foundations underlying automated threat detection algorithms, including machine learning models for anomaly detection, statistical pattern recognition methods, and real-time data processing techniques. Through comprehensive analysis of implementation strategies, performance metrics, and operational effectiveness, this research demonstrates that automated cybersecurity systems can reduce incident response times by up to 85\% while improving detection accuracy rates to 94.7\%. The investigation reveals that hybrid approaches combining rule-based systems with adaptive learning algorithms achieve optimal performance in dynamic threat environments. Furthermore, the research establishes mathematical models for threat probability assessment and risk quantification, providing frameworks for predictive security analytics. The findings indicate that organizations implementing comprehensive automation strategies experience a 67\% reduction in security breach incidents and achieve cost savings of approximately \$2.4 million annually. This study contributes to the field by presenting novel mathematical formulations for threat vector analysis and proposing standardized metrics for evaluating automated cybersecurity system performance across diverse organizational contexts.

Downloads

Published

2024-11-04

How to Cite

The Use of Automated Techniques in Cybersecurity Operations: Supporting Threat Detection and Information Assurance in Modern Information Systems. (2024). Applied Science, Engineering, and Technology Review: Innovations, Applications, and Directions, 14(11), 1-15. https://librasophia.com/index.php/ASETR/article/view/2024-Nov-04