logo

ENISA Big data Security Infrastructure | Report

   

Added on  2019-11-25

15 Pages3258 Words221 Views
REPORT
ENISA Big data Security Infrastructure | Report_1
ContentsIntroduction......................................................................................................................................2Question 1:.......................................................................................................................................2Question 2:.......................................................................................................................................5Question 3:.......................................................................................................................................7Question 4:.......................................................................................................................................9Question 5:.....................................................................................................................................11Conclusion.....................................................................................................................................12References......................................................................................................................................13
ENISA Big data Security Infrastructure | Report_2
IntroductionThe big data is used in the different areas which brings a drastic change in the applications whichare being used. Along with this, there is a proper setup of the changes with the implementation ofthe security risk patterns as well (Ko et al., 2016). . The analysis is based on how ENISA is involved in the cloud computing and the big data which includes the applications focusing on thedifferent given sectors. The standards are set for the research with the focus on processing all the personal information which is set in context to the serious privacy concerns. It includes the wide scale technologies, profiling and disclosures for handling the surveillance, profiling and the disclosures of the different private data patterns (Takabi et al., 2010).Question 1:1)Provide a brief overview of the case study and prepare a diagram for the ENISA BigData security infrastructure.The aim of the work is to focus on the ENISA data security infrastructure which includes the organisation working in the different sectors. The analysis is based on handling and working over the research centres, public organisations and in the different government agencies. The new business models are based on the aggregation and the analysis of the larger and the fast growing of the data. with this, it is also possible to work on the relative wide scale functioning through the use of profiling and the electronic surveillance. The importance is mainly to integratethe systems and improve the data protection safeguard methods with the analytical value chain analysisThe analysis is based on data protection safeguards with the analytics set for the value chain. The aim of the report is to focus on the challenges and the technology for big data. This includes the different technologies and the opportunities mainly for the privacy standards. The
ENISA Big data Security Infrastructure | Report_3
smarter infrastructures generally include the activities like the energy, deployment and the operations of the cyber physical system that are controlled by the equipment of the data and the interaction is mainly to collaborate and work on the exchanging of data under the different schemes which include the different levels of maturity as well. For this, the usage is depending upon the software controlled devices with the check on how the risks and the economy is collaborated with the data controlled equipment (Pearson et al., 2010). There are different schemes which are based on handling the software controlled devices with proper interaction thatincludes the physical world. The trends of the critical infrastructures include the smart infrastructure with deploying the IoT. ENISA works on the development of the secured smart infrastructures that comes from the cyber threats and by properly highlighting any of the securitypractices and the recommendations.
ENISA Big data Security Infrastructure | Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ENISA Big Data Security – Challenges and Recommendations (PDF)
|13
|3228
|258

Big Data Security Infrastructure ENISA - Report
|13
|3369
|187

Big Data: Security Issues and Challenges- Report
|14
|3382
|215

Impact of Threats on System | Report
|16
|3327
|50

Top Threats in Enisa Big Data Infrastructure
|16
|3661
|205

Enisa Big Data Security Infrastructure
|12
|3364
|245