Trusted by +2 million users,
1000+ happy students everyday
1000+ happy students everyday
Showing pages 1 to 3 of 9 pages
ANSWERS1) Provide a brief overview of the case study and prepare a diagram for the ENISA BigData security infrastructure.In the report of Big data Threat Landscape, ENISA explains various risks that are identified withBig Data which is an innovation that is in demand these days. This concept of Big Data isrequired to assume a noteworthy part influencing different parts of our society, running fromwellbeing, food security, and atmosphere and asset proficiency to vitality, better transportframeworks and the smart cities. The European Commission has recognized the influence of BigData in a flourishing information driven economy by defining the methodology of Big Data6.This contextual analysis of Enisa describes gap analysis that presents a correlation betweendistinguished Big Data dangers and its countermeasures. This case study is to discuss about theeffects of lack of countermeasures in this innovative era.Specifically, the main query emerges of the pattern of current countermeasures of adjustingexisting arrangements against conventional information dangers to the Big Data solution byconcentrating on the information's volume. This concept of countermeasure targets adaptabilityissues as well as does not fit in the characteristics of Big Data and brings about incomplete andinadequate methodologies. Many existing information concentrated conditions have latelyembraced a Big Data approach. This report adds to the meaning of the landscape of threat, bygiving a review of current as well as rising dangers pertinent to Big Data advances, and theirrelated patterns.ENISA Threat Landscape (ETL) Group developed the risk taxonomy which needs to beanalyzed. Various risks like network outage or any type of malfunction are the main reasons to
effect the Big data innovation. As we know that Big Data consist of a large number of bits ofinformation and every part might be in a different physical area. This design prompts a heavierdependence on the interconnections between servers. ENISA reports have managed the depthstudy of threats like network outages or malfunctions that influence the communication links32.Consequently, in this report, ENISA doesn't take these dangers into account.The utilization of cryptography might be not generally adequate and there are evident dangersrelated to network administrator as well as security experts with comparable benefits. Theconcept of big data develops the potential issue of information residency. If the data is saved inCloud computing that provides the solution of multi-national storage must be under variouslegitimate jurisdictions.When Big data systems are based over cloud foundation, a danger toclients' identity is that the control of a framework interface, in Big Data framework can be basedon public or private cloud infrastructure.Methods for enhancing Big Data analysis execution and the combination of heterogeneousinformation sources enhances the redundancy of information portrayal by creating poorlyensured duplicates. This difficulties conventional systems to secure confidentiality as well as itseffect must be considered. In a conventional data frameworks the loss of control of a supportinterface could cause constrained data storage, in Big Data the impact is opened up and the effectis more serious.
2) Out of the ‘’Top threats’’ which threat would you regard to be the most significant andwhy?According to me, the most significant threat to the security of Big data is loss of identity byhackers which leads to the loss of financial details of the users. It mainly effects economy of thecountry. The main function of Big data framework is to store as well as to accreditations in orderto access the personal information as well as financial budgetary records having details like visacard number, payment details, billing details. These details always remain on target for thehackers. This framework can also store profiling information that can depict client behavior,preferences, propensities, travel, and media utilization with a detailed framework and can alsohelp the hackers in more intricate types of impersonation fraud that creates an opportunity tosteal the identity of client.