logo

ENISA Big Data Security – Challenges and Recommendations (PDF)

13 Pages3228 Words258 Views
   

Added on  2019-11-12

ENISA Big Data Security – Challenges and Recommendations (PDF)

   Added on 2019-11-12

ShareRelated Documents
ENISA CASE STUDYReport
ENISA Big Data Security – Challenges and Recommendations (PDF)_1
ContentsQuestion 1:.......................................................................................................................................2Question 2:.......................................................................................................................................2Question 3:.......................................................................................................................................2Question 4:.......................................................................................................................................2Question 5:.......................................................................................................................................2References........................................................................................................................................3
ENISA Big Data Security – Challenges and Recommendations (PDF)_2
Question 1:1)Provide a brief overview of the case study and prepare a diagram for the ENISA BigData security infrastructure.The extensive collection is based on the data processes with the big data analytics that include the different and serious privacy concerns. The wider scale impacts of the surveillance, profiling is based on allowing the benefits without any invasion of the individual private spheres. The appraise big data is to integrate and focus on the protection of the data safeguards which aim at the support to handle the legal obligations. (Marions et al., 2012). ENISA works on the categorisation and the challenges which are used for the three cases mainly for the advancement in the Security Incident Event Management, the industrial control systems and the other telecoms. The privacy by the designing in big data is for processing the information with the big data analytics that have also given rise to the serious privacy concerns as well. The scale of the electronic surveillance, profiling and the other disclosures of the data is mainly to handle the integration with the data protection safeguards that are set to work on addressing the different opportunities of the technology for privacy (Gorton, 2015). The security measures that have been taken are mainly for the smart grids which enable the efficient use of the energy. Along with this, ENISA works on the smart grid patterns where the analysis is for the risks assessment and to handle the set of the different theories (Barnard, 2014).The certification of the components and the meta-schemes are related to handle the supply chain view of the smart grid where the support comes from the dialogue among the stakeholders. ENISA works on the security network tools which have been used for the management of the technology and to handle the cyber security and for the data duplication. Here, the balancing of
ENISA Big Data Security – Challenges and Recommendations (PDF)_3
the threats is to target the different assets along with the management of the information. The control and the analysis is for handling the end user organisations with the relevant vendor markets. There are different security techniques which are important to be identified and worked on depending upon the attacks from SQL injection and the management to reduce the attack surface as well. Question 2:2)Out of the ‘’Top threats’’ which threat would you regard to be the most significant and why?The web based attacks are mainly important for the security experts which are considered to be greatest and handling the different risks. The different threats which are related to this are the
ENISA Big Data Security – Challenges and Recommendations (PDF)_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ENISA Big data Security Infrastructure | Report
|15
|3258
|221

Big Data Security Infrastructure ENISA - Report
|13
|3369
|187

ENISA Threat Landscape | Report
|8
|1588
|308

Big Data: Security Issues and Challenges- Report
|14
|3382
|215

ENISA Big Data Threats Report | Assignment
|12
|3688
|260

Assignment | IT Risk Management Report
|15
|3626
|255