(PDF) Big Data: Security Issues and Challenges

Added on - 29 Nov 2019

  • 14

    Pages

  • 3382

    Words

  • 83

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 4 of 14 pages
REPORT
ContentsIntroduction......................................................................................................................................2Answer 1:.........................................................................................................................................2Answer 2:.........................................................................................................................................3Answer 3:.........................................................................................................................................5Answer 4:.........................................................................................................................................6Answer 5:.........................................................................................................................................8Conclusion.......................................................................................................................................9References......................................................................................................................................10
IntroductionThe case is related to the European Union Agency for the Network and Information Securitywhich includes the centres for the combination and the detailed security as well. Theidentification of the strategies with the combating of the insider threats help in determining allthe important threats which are included in the brief discussion below (Payton et al., 2014).Answer 1:1)Provide a brief overview of the case study and prepare a diagram for the ENISA BigData security infrastructure.As per the given case, the focus is on handling the networking tools of ENISA which needs tohandle the information technology systems with the proper control of the information which isset with the cyber threats, data duplication and the security analysis. The emerging kinds of thethreat analysis is based on working over the cyber threats with the world-wide patterns thatinclude the assigning of the central roles which are for the practical security incident and theevent management. There are different organisation which work on the management of thesoftware with the cyber security and the access is based on the organisational activities as well(Van Dijck, 2014). The forms and the standards match the limits related to the data that is basedon the threat intelligence. The consistency is important for the collection and working on theaggregation and the data correlation. This will be important for the end user protection andreducing the threats which are mainly related to the information systems. The provisions of thesecurity are mainly to match with the cases that relate to different organisations and how ENISAis able to handle the cyber security measures (Soria et al., 2016). The cases have been aboutmaking use of the threat information with involvement of the target assets to manage the security
standards involving the targets. The management of the security factors with the creation of abetter planning for removing any vulnerability is relevant with the controlled analysis whichincludes the application for the effective strategy measures and for cleaning the system. The caseis related to the web based attacks and how the malware defiance need to work on theapplications which are related to ENISA networking and security measures. The measures set forthe security standards are also related to handle the requirements with the organisational formsand the services, which are mainly due to the application processes that could be understood withthe use of SQL. The forms of the report and the testing is done in the web applicationvulnerability which tends to increase gradually (Payton et al., 2014).The security standards of ENISA is based on working over the current tools of IT and technologyis based on the significant impact patterns which includes the organisation planning. Thestandards are set to protect and meet the different objectives that will overcome the threatsrelated to the loss of data (Perera et al., 2015). The security standards are set to involve thedifferent aspects of the business models which have a major impact on the business networkingand the cyber security.
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document