Ask a question from expert

Ask now

Big Data: Security Issues and Challenges- Report

14 Pages3382 Words215 Views
   

Added on  2019-11-29

Big Data: Security Issues and Challenges- Report

   Added on 2019-11-29

BookmarkShareRelated Documents
REPORT
Big Data: Security Issues and Challenges- Report_1
ContentsIntroduction......................................................................................................................................2Answer 1:.........................................................................................................................................2Answer 2:.........................................................................................................................................3Answer 3:.........................................................................................................................................5Answer 4:.........................................................................................................................................6Answer 5:.........................................................................................................................................8Conclusion.......................................................................................................................................9References......................................................................................................................................10
Big Data: Security Issues and Challenges- Report_2
IntroductionThe case is related to the European Union Agency for the Network and Information Security which includes the centres for the combination and the detailed security as well. The identification of the strategies with the combating of the insider threats help in determining all the important threats which are included in the brief discussion below (Payton et al., 2014). Answer 1:1)Provide a brief overview of the case study and prepare a diagram for the ENISA BigData security infrastructure.As per the given case, the focus is on handling the networking tools of ENISA which needs to handle the information technology systems with the proper control of the information which is set with the cyber threats, data duplication and the security analysis. The emerging kinds of the threat analysis is based on working over the cyber threats with the world-wide patterns that include the assigning of the central roles which are for the practical security incident and the event management. There are different organisation which work on the management of the software with the cyber security and the access is based on the organisational activities as well (Van Dijck, 2014). The forms and the standards match the limits related to the data that is based on the threat intelligence. The consistency is important for the collection and working on the aggregation and the data correlation. This will be important for the end user protection and reducing the threats which are mainly related to the information systems. The provisions of the security are mainly to match with the cases that relate to different organisations and how ENISA is able to handle the cyber security measures (Soria et al., 2016). The cases have been about making use of the threat information with involvement of the target assets to manage the security
Big Data: Security Issues and Challenges- Report_3
standards involving the targets. The management of the security factors with the creation of a better planning for removing any vulnerability is relevant with the controlled analysis which includes the application for the effective strategy measures and for cleaning the system. The caseis related to the web based attacks and how the malware defiance need to work on the applications which are related to ENISA networking and security measures. The measures set forthe security standards are also related to handle the requirements with the organisational forms and the services, which are mainly due to the application processes that could be understood withthe use of SQL. The forms of the report and the testing is done in the web application vulnerability which tends to increase gradually (Payton et al., 2014). The security standards of ENISA is based on working over the current tools of IT and technologyis based on the significant impact patterns which includes the organisation planning. The standards are set to protect and meet the different objectives that will overcome the threats related to the loss of data (Perera et al., 2015). The security standards are set to involve the different aspects of the business models which have a major impact on the business networking and the cyber security.
Big Data: Security Issues and Challenges- Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Big Data Security Infrastructure ENISA - Report
|13
|3369
|187

ENISA Big Data Security – Challenges and Recommendations (PDF)
|13
|3228
|258

ENISA Big data Security Infrastructure | Report
|15
|3258
|221

ENISA Threat Landscape | Report
|8
|1588
|308

ENISA Big Data Threat Network Security
|14
|3524
|219

Impact of Threats on System | Report
|16
|3327
|50