(Solved) ENISA Case Study docx.
15 Pages3288 Words124 Views
Added on 2020-02-18
(Solved) ENISA Case Study docx.
Added on 2020-02-18
ShareRelated Documents
Running head: ENISA CASE STUDYENISA Case StudyName of the StudentName of the UniversityAuthor’s Note:
1ENISA CASE STUDYTable of ContentsIntroduction......................................................................................................................................2Discussion........................................................................................................................................31. Brief Overview of the Case Study...........................................................................................32. Main Threats............................................................................................................................32.1 Most Significant Threat.....................................................................................................73. Key Threat Agents...................................................................................................................73.1 Minimizing the Threats......................................................................................................83.2 Trends in Threat Probability..............................................................................................94. Improvement of ETL Process................................................................................................105. Current IT Security................................................................................................................10Conclusion.....................................................................................................................................11References......................................................................................................................................12
2ENISA CASE STUDYIntroductionThe huge set of data, analyzed by several calculations is known as Big Data. These datasets are utilized for disclosing the trends, associations, patterns that are directly related to theinteractions and behavior of human beings (Wu et al., 2014). The three features of big data aredefined by 3Vs. the 3Vs are the velocity of the data being processed, the major variety of thetypes of data and the total volume of data. It helps to designate the group of systems,technologies and several algorithms for the collection of data of various varieties and volume andalso for extraction of value by computation of the advanced analytics (Bansal & Kagemann,2015). The candidate data generators are mobile telecommunication networks and devices; webbased applications, dispersed multimedia sensors on the Internet of Things, and dispersedprocesses of business. The following report outlines the case study of ENISA. The threat landscape for big datagives a brief description on the security threats of ENISA. The report covers a brief introductionabout the case study. This case study became extremely popular in the year 2016 for the threatsand breaches of the big data assets (Enisa.europa.eu., 2017). The report also outlines the majorthreats that can be mapped with the big data assets with the details of the most significant threat.The report also helps to identify the key threat agents and the procedure to minimize the threats.The trends in threat probability and the improvement of ETL process are also covered here. Thereport gives a brief description on the current security of information technology.
3ENISA Information SystemSecurity PolicyFirewallsDigital AuthenticationAntivirusENISA CASE STUDYDiscussion1. Brief Overview of the Case StudyFigure 1: ENISA Big Data Security Infrastructure(Source: Erl, Khattak & Buhler, 2016)The European Union agency for Network and Information Security or ENISA is the hubof information security or network for the European Union, the member states, the citizens ofEurope and the private sectors. They work with all the groups to get the advice and properrecommendations in the security of the information (Enisa.europa.eu., 2017). They do their workfor improving the flexibility of the infrastructure of information and networks. ENISA is goingthrough several security threats and breaches in their agency. A security threat is the possibilityof danger that may occur in a system and can lead to dangerous vulnerabilities. These threats canbe either accidental or intentional. The accidental threats are those threats that are causedaccidentally either by malfunctioning of computer systems or by natural disasters. These canneither be mitigated nor be stopped at any point (Chen & Zhang, 2014). The other threat is the
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Risk Management | Enisa Case Studylg...
|16
|3811
|262
European Union Agency for Network and Information Security - PDFlg...
|12
|3085
|203
Case Study on System Risk Management at ENISAlg...
|16
|3810
|174
Risk Analysis and Security- ENISA Case Studylg...
|15
|3776
|213
Case study on Risk Management of Big Datalg...
|15
|3274
|170
IT Risk Management | ENISA Case Studylg...
|14
|3571
|182