Trusted by 2+ million users, 1000+ happy students everyday
Showing pages 1 to 4 of 17 pages
Running head: RISK ANALYSIS AND SECURITY Risk Analysis and Security: ENISA case study Name of the Student: Student ID: Name of the University: Author’s note:
1RISK ANALYSIS AND SECURITY Table of Contents Introduction......................................................................................................................................2 1. Overview of scenario and ENISA Big Data security infrastructure diagram..............................2 1.1 Overview of ENISA case study.............................................................................................2 1.2 ENISA Big Data Security Infrastructure Diagram................................................................3 2. Explanation of the Top Threat in the ENISA..........................................................................7 3. Key Threat Agents and their Impact Reduction Options.............................................................9 4. Improvement of ETL process....................................................................................................12 5. Justification of IT security in ENISA........................................................................................13 Conclusion.....................................................................................................................................13 References......................................................................................................................................14
2RISK ANALYSIS AND SECURITY Introduction The risk analysis and security is very important for the organization to implement the effectiveoperationsandintegratingtheflowofsystemdevelopment(Mahajan,Gaba& Chauhan, 2016). The development of the project would help in integrating the development of the operations and apply the effective functions within the organization. The operational processing is implied for forming the analysis of the risk that the organization might face while performingtherequiredoperationsandfunctions.AccodingtoKaoetal.(2014),the development of the risk analysis is based for the development of the operations to develop the integrated functions for the processes of the organization. The following report would help in integrating the operations of the organization for developingrisk assessmentand analysis. Thereport would tendto evaluatetherole of technology for implementing the effective risk assessment by evaluating the case study of ENISA. The practice of the big data strategy had been helpful for the improvement of operations within the organization. However, the practice of big data had formed the issues and threats of security for the organization. The analysis of the threats of the big data strategy for ENISA would discuss the agents of threat. 1. Overview of scenario and ENISA Big Data security infrastructure diagram 1.1 Overview of ENISA case study TheENISAorganizationhaddeployedthebigdataanalyticsforformingthe development of the effective operations and development in the organization (Enisa.europa.eu, 2017). ENISA has implied for developing the big data strategy in their organization. The risk and
3RISK ANALYSIS AND SECURITY threat management should be implied for forming the effective development of improvement operations.Thebigdatathreatswouldresultinformingtheoccasionalthreatsforthe organization in integration of the system within the organization. The ENISA is one of the most effective operations that could monitor the flow of operations within the organization and imply effective security system within the organization. The big data privacy is a major factor that accords the deployment of the potential development model for the ENISA (Patil & Seshadri, (2014). The operations of the organization would be highly improved by the use of the big data strategywithintheorganization.TheorganizationhadappliedICTbasedsolutionsfor developing the security functions for their Big Data Strategy in the organization. The various owners such as data transformers, data owners, and computation and storage providers at ENISA would require effective data management and security for the information and data used at the organization. The best practices of the organization for threat and data management would involve the effective flow of operations (Vatsalan et al., (2017). The operational processing is implied for forming the analysis of the risk that the organization might face while performing the required operations and functions. The development of the risk analysis is based for the development of the operations to develop the integrated functions for the processes of the organization. 1.2 ENISA Big Data Security Infrastructure Diagram ENISA had implied the use of the structured framework for implying the effective operations of the big data strategy. The infrastructure of the big data analytics is developed for implementing the effective processing of the information. The various layers of the big data structure include data sources, integration process, data storage, analytics and computing models,
Found this document preview useful?
You are reading a preview Upload your documents to download or Become a Desklib member to get accesss