1.1)Provide a brief overview of the case study and prepare a diagram for the ENISA BigData security infrastructure.The data security infrastructure of ENISA is based on how the different business players and the technology providers work on handling and creating the different new products. The extensive designing collection and the processing of the information is based on how the big data analytics work over the privacy concerns with the wide range of the electronic surveillance, profiling and the other disclosures that are done for any of the private data. The benefits of the analytics re based on working over the limits to process and integrate the system. It includes the approaches with taking the different positions that relate to the challenges of the technology for the big data and the opportunities for the same. This will help in enhancing the technologies with the current and the future big data requirements. The anonymization is based on working over the privacy preserving computations, granular accessing control mechanisms, and the policy enforcement patterns. The computation and the accountability is to handle the provenance that is set for the user empowerment and the control. (Jerome, 2013).ENISA works on the three cases related to the systems where there is a use of the advancement in the Security Incident Event Management (SIEM), Big data for the Industrial control systems and in the telecoms. The focus has been on the privacy concerns which relate to the wide scale electronic surveillance, profiling and the disclosure of the private data. The benefits are based on the cost of privacy where the time and technology does not stop. The focus is also on crafting the right balance mainly to make use of the defined privacy by designed strategies. ENISA works on the defined patterns with the privacy and data protection with defined benefits that allow the analytics without any compromise in the personal protection of the data. The technologies are based on the setup with
the control mechanisms with the policy enforcement and accountability. The transparency and the accessing of the tools are for the big data. It is mainly based on the user empowerment. The big data is mainly to handle the standards of the sensors for the Internet of Things and how the mobile telecommunication devices and the network processes are set for the web based applications. (Payton et al., 2014)2.
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
ENISA Big Data Security – Challenges and Recommendations (PDF)lg...
|13
|3228
|258
ENISA Big data Security Infrastructure | Reportlg...
|15
|3258
|221
Big Data: Security Issues and Challenges- Reportlg...