(PDF) Big Data Security – Challenges and Recommendations

Added on - 12 Nov 2019

  • 13

    Pages

  • 3228

    Words

  • 119

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 4 of 13 pages
ENISACASESTUDYReport
ContentsQuestion 1:.......................................................................................................................................2Question 2:.......................................................................................................................................2Question 3:.......................................................................................................................................2Question 4:.......................................................................................................................................2Question 5:.......................................................................................................................................2References........................................................................................................................................3
Question 1:1)Provide a brief overview of the case study and prepare a diagram for the ENISA BigData security infrastructure.The extensive collection is based on the data processes with the big data analytics that includethe different and serious privacy concerns. The wider scale impacts of the surveillance, profilingis based on allowing the benefits without any invasion of the individual private spheres. Theappraise big data is to integrate and focus on the protection of the data safeguards which aim atthe support to handle the legal obligations. (Marions et al., 2012). ENISA works on thecategorisation and the challenges which are used for the three cases mainly for the advancementin the Security Incident Event Management, the industrial control systems and the othertelecoms. The privacy by the designing in big data is for processing the information with the bigdata analytics that have also given rise to the serious privacy concerns as well. The scale of theelectronic surveillance, profiling and the other disclosures of the data is mainly to handle theintegration with the data protection safeguards that are set to work on addressing the differentopportunities of the technology for privacy (Gorton, 2015).The security measures that have been taken are mainly for the smart grids which enable theefficient use of the energy. Along with this, ENISA works on the smart grid patterns where theanalysis is for the risks assessment and to handle the set of the different theories (Barnard, 2014).The certification of the components and the meta-schemes are related to handle the supply chainview of the smart grid where the support comes from the dialogue among the stakeholders.ENISA works on the security network tools which have been used for the management of thetechnology and to handle the cyber security and for the data duplication. Here, the balancing of
the threats is to target the different assets along with the management of the information. Thecontrol and the analysis is for handling the end user organisations with the relevant vendormarkets. There are different security techniques which are important to be identified and workedon depending upon the attacks from SQL injection and the management to reduce the attacksurface as well.Question 2:2)Out of the ‘’Top threats’’ which threat would you regard to be the most significantand why?The web based attacks are mainly important for the security experts which are considered to begreatest and handling the different risks. The different threats which are related to this are the
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document