logo

(Solved) ENISA Case Study docx.

15 Pages3288 Words124 Views
   

Added on  2020-02-18

(Solved) ENISA Case Study docx.

   Added on 2020-02-18

ShareRelated Documents
Running head: ENISA CASE STUDYENISA Case StudyName of the StudentName of the UniversityAuthor’s Note:
(Solved) ENISA Case Study docx._1
1ENISA CASE STUDYTable of ContentsIntroduction......................................................................................................................................2Discussion........................................................................................................................................31. Brief Overview of the Case Study...........................................................................................32. Main Threats............................................................................................................................32.1 Most Significant Threat.....................................................................................................73. Key Threat Agents...................................................................................................................73.1 Minimizing the Threats......................................................................................................83.2 Trends in Threat Probability..............................................................................................94. Improvement of ETL Process................................................................................................105. Current IT Security................................................................................................................10Conclusion.....................................................................................................................................11References......................................................................................................................................12
(Solved) ENISA Case Study docx._2
2ENISA CASE STUDYIntroductionThe huge set of data, analyzed by several calculations is known as Big Data. These datasets are utilized for disclosing the trends, associations, patterns that are directly related to theinteractions and behavior of human beings (Wu et al., 2014). The three features of big data aredefined by 3Vs. the 3Vs are the velocity of the data being processed, the major variety of thetypes of data and the total volume of data. It helps to designate the group of systems,technologies and several algorithms for the collection of data of various varieties and volume andalso for extraction of value by computation of the advanced analytics (Bansal & Kagemann,2015). The candidate data generators are mobile telecommunication networks and devices; webbased applications, dispersed multimedia sensors on the Internet of Things, and dispersedprocesses of business. The following report outlines the case study of ENISA. The threat landscape for big datagives a brief description on the security threats of ENISA. The report covers a brief introductionabout the case study. This case study became extremely popular in the year 2016 for the threatsand breaches of the big data assets (Enisa.europa.eu., 2017). The report also outlines the majorthreats that can be mapped with the big data assets with the details of the most significant threat.The report also helps to identify the key threat agents and the procedure to minimize the threats.The trends in threat probability and the improvement of ETL process are also covered here. Thereport gives a brief description on the current security of information technology.
(Solved) ENISA Case Study docx._3
3ENISA Information SystemSecurity PolicyFirewallsDigital AuthenticationAntivirusENISA CASE STUDYDiscussion1. Brief Overview of the Case StudyFigure 1: ENISA Big Data Security Infrastructure(Source: Erl, Khattak & Buhler, 2016)The European Union agency for Network and Information Security or ENISA is the hubof information security or network for the European Union, the member states, the citizens ofEurope and the private sectors. They work with all the groups to get the advice and properrecommendations in the security of the information (Enisa.europa.eu., 2017). They do their workfor improving the flexibility of the infrastructure of information and networks. ENISA is goingthrough several security threats and breaches in their agency. A security threat is the possibilityof danger that may occur in a system and can lead to dangerous vulnerabilities. These threats canbe either accidental or intentional. The accidental threats are those threats that are causedaccidentally either by malfunctioning of computer systems or by natural disasters. These canneither be mitigated nor be stopped at any point (Chen & Zhang, 2014). The other threat is the
(Solved) ENISA Case Study docx._4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risk Management | Enisa Case Study
|16
|3811
|262

European Union Agency for Network and Information Security - PDF
|12
|3085
|203

Case Study on System Risk Management at ENISA
|16
|3810
|174

Risk Analysis and Security- ENISA Case Study
|15
|3776
|213

Case study on Risk Management of Big Data
|15
|3274
|170

IT Risk Management | ENISA Case Study
|14
|3571
|182