logo

European Union Agency for Network and Information Security - PDF

12 Pages3085 Words203 Views
   

Added on  2019-11-20

European Union Agency for Network and Information Security - PDF

   Added on 2019-11-20

ShareRelated Documents
European Union Agency for Network and Information Security - PDF_1
ENISA Big Data Security Overview of Case Study..............................................................................................................................3ENISA Big Data Security Infrastructure Diagram.......................................................................................3Top Threats & Most Significant Threat.......................................................................................................4Threat Agents & Steps to Minimize their Impact........................................................................................5Trends in Threat Probability........................................................................................................................9Improvements in ETL Processes...............................................................................................................10Challenging Threats for ENISA............................................................................................................10Current IT Security State of ENISA – Recommendations & Conclusion..................................................11References.................................................................................................................................................122
European Union Agency for Network and Information Security - PDF_2
ENISA Big Data Security Overview of Case StudyENISA is an abbreviation for European Union Agency for Network and Information Security. Itis a centre that has been set up for the maintenance and improvement of the information andnetwork security across Europe. A case study has been covered on the Big Data threats that areassociated with ENISA and an ENISA Technology Landscape (ETL) was published discussingthe same in the year 2016. Big Data is a term that refers to the huge volumes of structured, semi-structured and unstructured data that may comprise of data of different data types. There aremany threats that have been discussed in the case study that are associated with Big Data. Thethreats that have been described in the case study mainly include the eavesdropping/interception/hijacking threats, nefarious activity/abuse, unintentional loss and damage of IT assets andinformation, organizational threats due to skill shortage and legal threats (Enisa, 2016).The case study is spread across seven sections and there are sub-sections and appendices that arealso included. Section one provides an introduction to the case study covering the policy context,scope, target audience, methodology and structure of the document. It is followed by thediscussion of Big Data environments and assets in sections two and three respectively. Big Datathreats and threat agents have been illustrated in section four and five followed by good practicesand gap analysis in sections six and seven. ENISA Big Data Security Infrastructure DiagramThere are a lot of elements that are involved in the Big Data architecture. These elements includethe data sources, integration process, data storage, analytics and computing models along withthe presentation. All of these elements further include various components and entities. Due tothe involvement of so many entities and the requirement to manage huge clusters of data sets,there are various risks that are associated with ENISA Big Data.There may be security risks and attacks in the form of eavesdropping attacks, malware attacks,information breaches, loss and leakage. These may result in legal obligations as well. There mayalso be organizational issues that may result in compromise of security.It is, therefore, required to develop a security infrastructure to deal with the Big Data threats. Thesecurity structure must include the security of the Big Data components at various levels andshall include a mix of administrative as well as logical control for the enhancement of security. 3
European Union Agency for Network and Information Security - PDF_3
ENISA Big Data Security Figure 1: ENISA Big Data Security Infrastructure DiagramThe security infrastructure for ENISA Big Data Security has been illustrated above. It comprisesof five different sections with various sub-components that would make sure that the overallsecurity of the Big Data is enhanced and is maintained as well. Top Threats & Most Significant ThreatThere are a number of security threats and attacks that may take place on the Big Data sets thatare associated with ENISA. The major threat categories that have been identified includeeavesdropping/interception/hijacking threats, nefarious activity/abuse, unintentional loss anddamage of IT assets and information, organizational threats due to skill shortage and legalthreats. There are specific threats that come under each of these threat categories which may leadto the compromise of the safety and privacy of Big Data. Out of the various threats that have been identified in association with Big Data, the mostsignificant threat category is the unintentional damage/loss of IT information or IT assets. This isdue to the reason that there are a lot many causes and reasons that are associated with thisparticular form of security attack. The loss of information in the cloud is one of the most4
European Union Agency for Network and Information Security - PDF_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risk Management | Enisa Case Study
|16
|3811
|262

ENISA Big Data Threat Network Security
|14
|3524
|219

IT Risk Management - Case Study - ITC596
|11
|3284
|69

Risk Analysis and Security- ENISA Case Study
|15
|3776
|213

ENISA Big Data Infrastructure | Assignment
|14
|3649
|302

(Solved) ENISA Case Study docx.
|15
|3288
|124