Assignment- ENISA Big Data Threat | Network Security

Added on - 19 Feb 2020

  • 14


  • 3524


  • 86


  • 0


Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 4 of 14 pages
Running Head:ENISA BIG DATA THREAT LANDSCAPEENISA Big Data Threat LandscapeName of Student-Student ID-Name of University-Author Note-
1ENISA BIG DATA THREAT LANDSCAPEAnswer to Question 1:ENISA is the European Union Agency for Network and Information Security. Thisagency enables the cyber security in the organizations of Europe. NIS (Network and InformationSecurity) of high level are contributed by ENISA within the union of ENISA (Reuter, 2015).This is done by promoting and developing the culture of Network and Information Security sothat it can assist to function good and properly in internal market. The ENISA was set up in theyear 2004 to contribute a NIS to level up in the European Union. To proper functioning ofinternal market, ENISA has implied a developed culture of Network and Information Security.To give the solutions and advice, the agency works with the members of the state andalso the private sector (Schneider, 2017). The exercises of cyber security of pan European isincluded in ENISA along with the strategies of for developing the National Cyber Security.ENISA also includes exercises on capacity and cooperation of CSIRT and also gives security oncloud adoption, addressing the issues related to data protection, enhancing technologies that areprivate, emerging technologies that are private trust services and email ids an also cyber threatlandscape. The implementation and the development of the Union policy of Europe and the lawthat are related with Network and Information Security are also supported by ENISA.The case study that is given is about the Threat landscape of ENISA which was reportedlast year in 2016. The top threats that are faced by the cyber sector are given in details in thiscase study. All these cyber attacks was assessed and reported in 2016. Increasing cyber threatshave leaded the European Threat Landscape to concentrate more on the attacker and attackvectors and find their solutions that are needed to mitigate them (Eininger, Skopik & Fiedler,2015). The top cyber attacks are detailed in this case study and their respective mitigations are
2ENISA BIG DATA THREAT LANDSCAPEalso described. There are all total of fifteen top cyber attacks that Europe have came across andall the kill chain of the respective threats have been clearly described. The threat agents areelaborated in this case study that is associated with the cyber attacks of the European countries.The trend of threat agents, and their motives along with the defenders of the threat attackers arebriefly discussed (Bendiek, 2015). Some common examples are given that are related toransomware attack, data breach attack, Denial of services attack and the targeted attack. Thediagram that shows the infrastructure of ENISA Big Data security is given below.ENISASector Facing Security ChallengesFINANCE SECTORPOWER UTILITYTELECOM OPERATORSECURITY CHALLENGES FACEDSECURITY CHALLENGES FACEDSECURITY CHALLENGES FACEDTrustworthiness ofdevices collecting dataSource validation anddata filteringApplication softwaresecurityAccess control andauthenticationInteroperability ofapplicationsSource Validation andFilteringApplication SoftwareSecurityAccess Control andAuthenticationSupply Chain SecuritySecure DataManagementInfrastructure SecuritySecure Use of CloudcomputingSource validation andfiltering of dataApplication softwaresecurityInfrastructure securityDistributed DoS attackAccess control andauthenticationMITIGATION CONTROLENCRYPTIONSECURITY TESTING AND CODE AUDITINGCERTIFICATION STANDARDSRISK ASSESSEMENTSOURCE FILTERINGACCESS CONTROL AND AUTHENTICATIONMONITORING AND LOGGINGFig: ENISA Big Data Security Infrastructure
3ENISA BIG DATA THREAT LANDSCAPEAnswer to Question 2:This case study involves fifteen types of top threats that ENISA faces. They are asfollows:Malware: Malwares are the top cyber attack for the present year. The malware of thecyber threat are mainly information stealing and the ransomware attack. Malwares are qualitativeconcern instead of quantitative concern (Weber, A., & Weber, 2015). The malware that hasincreased during the report that was filed in 2016 is the mobile malware. The current trend thathas been observed for malware is increasing. The threats that are related to malwares are spam,exploit kits, data breach and leakage of information.Web-based attacks: The attacks that use components of web as a medium of attack arecalled the web based attacks. The threats related to web clients and web server are the web basedattacks. This type of threat is discrete to the web application attacks (Witt & Freudenberg, 2016).The current trend that has been observed is increasing. The threats that are related are botnets,data breaches, information leakage, spam and malware.Attacks of web application: The attacks that are against the web services or the webapplications are called the web applications. This attack overlaps the web based attacks. Webapplications are available assets that attack the surface that are challenged by the agents of threat.The current trend that has been observed is increasing (Catteddu & Hogben, 2015). The threatsthat are related are botnets, data breaches, information leakage, spam and malware.Denial of Service: Denial of Services has created an important aspect in the cyber threatattack. Denial of Services led to infrastructure and services down, extortion and the data breachesthat take place in cyber attack. The current trend that has been observed is increasing. The threats
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document