Ask a question from expert

Ask now

Big Data Security Infrastructure ENISA - Report

13 Pages3369 Words187 Views
   

Added on  2019-11-20

Big Data Security Infrastructure ENISA - Report

   Added on 2019-11-20

BookmarkShareRelated Documents
REPORT
Big Data Security Infrastructure ENISA - Report_1
Contents1.......................................................................................................................................................22.......................................................................................................................................................33.......................................................................................................................................................44.......................................................................................................................................................65.......................................................................................................................................................8References......................................................................................................................................10
Big Data Security Infrastructure ENISA - Report_2
1.1)Provide a brief overview of the case study and prepare a diagram for the ENISA BigData security infrastructure.The data security infrastructure of ENISA is based on how the different business players and the technology providers work on handling and creating the different new products. The extensive designing collection and the processing of the information is based on how the big data analytics work over the privacy concerns with the wide range of the electronic surveillance, profiling and the other disclosures that are done for any of the private data. The benefits of the analytics re based on working over the limits to process and integrate the system. It includes the approaches with taking the different positions that relate to the challenges of the technology for the big data and the opportunities for the same. This will help in enhancing the technologies with the current and the future big data requirements. The anonymization is based on working over the privacy preserving computations, granular accessing control mechanisms, and the policy enforcement patterns. The computation and the accountability is to handle the provenance that is set for the user empowerment and the control. (Jerome, 2013).ENISA works on the three cases related to the systems where there is a use of the advancement in the Security Incident Event Management (SIEM), Big data for the Industrial control systems and in the telecoms. The focus has been on the privacy concerns which relate to the wide scale electronic surveillance, profiling and the disclosure of the private data. The benefits are based on the cost of privacy where the time and technology does not stop. The focus is also on crafting the right balance mainly to make use of the defined privacy by designed strategies. ENISA works on the defined patterns with the privacy and data protection with defined benefits that allow the analytics without any compromise in the personal protection of the data. The technologies are based on the setup with
Big Data Security Infrastructure ENISA - Report_3
the control mechanisms with the policy enforcement and accountability. The transparency and the accessing of the tools are for the big data. It is mainly based on the user empowerment. The big data is mainly to handle the standards of the sensors for the Internet of Things and how the mobile telecommunication devices and the network processes are set for the web based applications. (Payton et al., 2014)2.
Big Data Security Infrastructure ENISA - Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ENISA Big Data Security – Challenges and Recommendations (PDF)
|13
|3228
|258

ENISA Big data Security Infrastructure | Report
|15
|3258
|221

Big Data: Security Issues and Challenges- Report
|14
|3382
|215

ENISA Threat Landscape | Report
|8
|1588
|308

Case study on Risk Management of Big Data
|15
|3274
|170

Enisa Big Data Security Infrastructure
|12
|3364
|245