logo

Big Data: A Case Study

16 Pages3893 Words157 Views
   

Added on  2019-11-12

Big Data: A Case Study

   Added on 2019-11-12

ShareRelated Documents
Running head: IT RISK MANAGEMENTIT Risk ManagementName of the StudentName of the UniversityAuthor Note
Big Data: A Case Study_1
1 IT RISK MANAGEMENTTable of ContentsQuestion 1..................................................................................................................................2Question 2..................................................................................................................................5Question 3..................................................................................................................................6Question 4..................................................................................................................................7Question 5..................................................................................................................................9References................................................................................................................................11
Big Data: A Case Study_2
2 IT RISK MANAGEMENTIntroductionThe case study provides a brief overview of the big data threats that is associated withthe use of big data and its relative technology. The technology will have immense work in thenear future. ENSIA has elaborated on different topics, which are all connected to the use ofbig data servers and the technology in modern day world. Hackers and threats are all over theinternet trying to grasp a moment to attack and steal data from the servers. The reportdiscusses about the different threats and the possible measures to follow to eliminate thoserisks. Question 1Provide a brief overview of the case study and prepare a diagram for the ENISA Big Datasecurity infrastructure.In the case study provided for this report ENISA, shows an elaborate discussion of thethreats that are related to the big data use in ENISA. The topic of discussion has gainedlimelight in the recent years, which has forced the use of data storage methods andinformation technology to have a serious role in different aspects of the society (Marinos,2013). The aspect that is to be developed and changes for the developments of theinformation technology and the use of Big Data analysis in the health security perspective,food security and climate and other resources that is efficient in the mode of systemintegration. The impact that of the big data analysis and threats has been approved by theEuropean Commission who have identified the approach to be in a strategic format of the useof Big Data. This way the data is being stored is conceivable of the economic drive in thesystem of the organization that is using the technology (Marinos, 2013). There has beenfound to be escalation in the field of research and science that has always been in the top
Big Data: A Case Study_3
3 IT RISK MANAGEMENTpriority. This has forced different organizations around the world to launch different researchproposals for the better exploration of the prospect of use of Big Data in the field of cloudcomputing and data analysis. There has been recent implementation of Big Data in thedepartment of military organizations. They have used the technology to help the soldiers toassists them in fighting virtual and real terrorism. They collect information and data fromdifferent sources in the internet, which has been marked as real field or as open sourceprograms (Marinos, Belmonte &Rekleitis, 2014). There is a use of highly novel and differenthigh technology modules for the implementation of Big Data with the help of differentInformation and Communications Technology (ICT) systems. However, the increased use ofthis technology of Big Data has prompted the hackers to launch different cyber-attacks anddata breach on the cloud servers. The increase of such attacks have increased the trend ofimpactful and sophisticated. Due to the increase for usage of Big Data in businessorganizations, the hackers get a positive edge in the process of developing a specializedformative attack on the Big Data analysis. This form of technology also has capability to beused in the form of a tool, which can be used to stop cyber-attacks by providing security andprivacy professionals who have the better insight of the incident and to be managed carefully.ENISA provides the delivery of this area in the form of Threats Landscapes in the field ofBig Data analysis (Marinos, Belmonte &Rekleitis, 2014). The case study of the discussiondiscuses about the form of architecture that is followed by ENISA in the domain of Big Dataanalysis and threat taxonomy. The method, which is also, followed by ENISA and aslo thegaps and the recommendation has been discussed. The use of cloud computing has been depicted as a form of infrastructure layer whichhas an implementation of Big Data system in ENISA. The infrastructure used by ENISA hasmet all the requirements like cost effectiveness, elasticity and ability of the infrastructure to
Big Data: A Case Study_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Big Data Analysis | ENISA
|16
|3718
|133

Assignment | IT Risk Management Report
|15
|3626
|255

ITC596 - IT Risk Management - Report
|17
|4057
|40

Risk Management Case Study - Threats Associated With ENISA
|16
|3355
|48

Information Technology (IT) Risk Management
|18
|4070
|295

IT Risk Management | ENISA Case Study
|14
|3571
|182