logo

Risk Analysis and Security: ENISA Case Study

17 Pages4120 Words61 Views
   

Added on  2020-02-23

About This Document

Overview of scenario and ENISA Big Data security infrastructure diagram 2 1.1 Overview of ENISA case study2 1.2 ENISA Big Data Security Infrastructure Diagram 3 2. Overview of scenario and ENISA Big Data security infrastructure diagram 1.1 Overview of ENISA case study The ENISA organization had deployed the big data analytics for forming the development of the effective operations and development inthe organization (Enisa.europa.eu, 2017).

Risk Analysis and Security: ENISA Case Study

   Added on 2020-02-23

ShareRelated Documents
Running head: RISK ANALYSIS AND SECURITY
Risk Analysis and Security: ENISA case study
Name of the Student:
Student ID:
Name of the University:
Author’s note:
Risk Analysis and Security: ENISA Case Study_1
1RISK ANALYSIS AND SECURITY
Table of Contents
Introduction......................................................................................................................................2
1. Overview of scenario and ENISA Big Data security infrastructure diagram..............................2
1.1 Overview of ENISA case study.............................................................................................2
1.2 ENISA Big Data Security Infrastructure Diagram................................................................3
2. Explanation of the Top Threat in the ENISA..........................................................................7
3. Key Threat Agents and their Impact Reduction Options.............................................................9
4. Improvement of ETL process....................................................................................................12
5. Justification of IT security in ENISA........................................................................................13
Conclusion.....................................................................................................................................13
References......................................................................................................................................14
Risk Analysis and Security: ENISA Case Study_2
2RISK ANALYSIS AND SECURITY
Introduction
The risk analysis and security is very important for the organization to implement the
effective operations and integrating the flow of system development (Mahajan, Gaba &
Chauhan, 2016). The development of the project would help in integrating the development of
the operations and apply the effective functions within the organization. The operational
processing is implied for forming the analysis of the risk that the organization might face while
performing the required operations and functions. Accoding to Kao et al. (2014), the
development of the risk analysis is based for the development of the operations to develop the
integrated functions for the processes of the organization.
The following report would help in integrating the operations of the organization for
developing risk assessment and analysis. The report would tend to evaluate the role of
technology for implementing the effective risk assessment by evaluating the case study of
ENISA. The practice of the big data strategy had been helpful for the improvement of operations
within the organization. However, the practice of big data had formed the issues and threats of
security for the organization. The analysis of the threats of the big data strategy for ENISA
would discuss the agents of threat.
1. Overview of scenario and ENISA Big Data security infrastructure diagram
1.1 Overview of ENISA case study
The ENISA organization had deployed the big data analytics for forming the
development of the effective operations and development in the organization (Enisa.europa.eu,
2017). ENISA has implied for developing the big data strategy in their organization. The risk and
Risk Analysis and Security: ENISA Case Study_3
3RISK ANALYSIS AND SECURITY
threat management should be implied for forming the effective development of improvement
operations. The big data threats would result in forming the occasional threats for the
organization in integration of the system within the organization. The ENISA is one of the most
effective operations that could monitor the flow of operations within the organization and imply
effective security system within the organization. The big data privacy is a major factor that
accords the deployment of the potential development model for the ENISA (Patil & Seshadri,
(2014). The operations of the organization would be highly improved by the use of the big data
strategy within the organization. The organization had applied ICT based solutions for
developing the security functions for their Big Data Strategy in the organization. The various
owners such as data transformers, data owners, and computation and storage providers at ENISA
would require effective data management and security for the information and data used at the
organization. The best practices of the organization for threat and data management would
involve the effective flow of operations (Vatsalan et al., (2017). The operational processing is
implied for forming the analysis of the risk that the organization might face while performing the
required operations and functions. The development of the risk analysis is based for the
development of the operations to develop the integrated functions for the processes of the
organization.
1.2 ENISA Big Data Security Infrastructure Diagram
ENISA had implied the use of the structured framework for implying the effective
operations of the big data strategy. The infrastructure of the big data analytics is developed for
implementing the effective processing of the information. The various layers of the big data
structure include data sources, integration process, data storage, analytics and computing models,
Risk Analysis and Security: ENISA Case Study_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ENISA Case Study | Risk Analysis and Security Report
|17
|3802
|351

Risk Analysis and Security | ENISA Case Study
|15
|3196
|160

Risk Management | Enisa Case Study
|16
|3811
|262

Risk Analysis and Security- ENISA Case Study
|15
|3776
|213

European Union Agency for Network and Information Security - PDF
|12
|3085
|203

IT Risk Management | ENISA Case Study
|14
|3571
|182