Ask a question from expert

Ask now

ENISA Threat Landscape | Report

8 Pages1588 Words308 Views
   

Added on  2019-10-16

ENISA Threat Landscape | Report

   Added on 2019-10-16

BookmarkShareRelated Documents
ENISA THREAT LANDSCAPE[Document subtitle]
ENISA Threat Landscape | Report_1
1ANSWER 1The case was about the ENISA which highlighted the variation in the system of information technology in the year 2014. The report was published as ETL i.e. ENISA Threat Landscape. ENISA is the center of expertise in cyber security in Europe. In the report, the cyber threat has been identified. ETL demonstrated the information about the threat of landscape, the agents of threat and the attack vectors (Marinos, 2013). The motive of ENISA behind issuing the report was to contribute to the execution of the strategy of EU cyber security by using the attainable information on the evolution of cyber. The report of ETL provides guidance and on that basis, the management can make decisions and can implement policies related to the protection of asset. ANSWER 2ENISA stated that the focus would be on the formulation of the strategies for the security information. It can be seen from the above figure that ENISA supports the victim in order to
ENISA Threat Landscape | Report_2
2solve the problems of security. The organizations and people get the benefit from the usage of the infrastructure of security. The guidelines for security are given which help the people to remain safe from the threats of technology. The areas which demand more attention are smart grids, cities, transport system, etc. The compromise cannot be done with these areas. The articulation of the infrastructure of security support in mobilizing the community of cyber security in an effective manner (ENISA, 2013).ANSWER 3The insider threats are the mixture of some threats like physical damage, data breach, phishing, malicious code, etc. There are some strategies which will help in combatting the insider threats are:The tool of protection i.e. DDoS can handle the attacks of DDoS effectively with the helpof fire blades.The practice of auditing on the regular basis will help in solving the problem affiliated to SQL injection.The problem of the data breach can be resolved if the sharing of data from one device to another gets reduced. The media which provide intelligence to the attackers should not be downloaded.The file should be shared and transferred before the disposition of equipment of storage as it retrieves the data if the formatting is done.ANSWER 4 The web-based attack is the most significant as compared to the other threats as their main target is the host. It pays more attention to the OSI system. It provides susceptibility of various
ENISA Threat Landscape | Report_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Report on ENISA Big Data Security Infrastructure
|13
|3109
|112

ENISA Big Data Threat Network Security
|14
|3524
|219

(Solved) ENISA Case Study docx.
|15
|3288
|124

Top Threats in Enisa Big Data Infrastructure
|16
|3661
|205

European Union Agency for Network and Information Security - PDF
|12
|3085
|203

ENISA and the Big Data Threat Landscape
|15
|3536
|148