Limited-time discount for students! | Solutions starting at $6 each

Network and Information Security Analysis Case

Added on - 19 Nov 2019

  • 13

    Pages

  • 3072

    Words

  • 246

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 4 of 13 pages
IT Risk Management]
ContentsIntroduction..........................................................................................................................................4Q 1)Overview of ENISA organization.................................................................................................4Q2) Top Threats....................................................................................................................................6Q 3)Threats agents................................................................................................................................8Q4) ETL Process..................................................................................................................................9Q5. ENISA organization satisfied with current IT security................................................................11Conclusion..........................................................................................................................................12References......................................................................................................................................13
IntroductionIn this project,Network and Information Securityof theEuropean Union Agency is taken foranalysis. The company is network based and it is an expertise of information security for theEuropean Union, its other member states and other citizens of the Europe. The overview of theinfrastructure of the company is discussed and the network infrastructure diagram is provided usingthe visio software. The top most threats involved in the organization is being analyzed and thesignificant threat among all the threats involved is discussed in detail. The agents that cause threatsto the organization and the counter measures that should be taken to prevent the organization fromthose threat agents are being discussed. The ETL process of the Organization in general is explainedin detail and the improvements in ETL process of ENISA is being discussed. The improved steps tobe taken in the extraction, transformation and storage process of ENISA is to be explained. Theoverall justification about the company is being provided regarding its security. The justificationtalks about whether the ENISA is providing an information security to the data managed by them inthe organization.
Q 1)Overview of ENISA organizationENISA Network InfrstructureThe ENISA big data security infrastructure is shown below.The ENISA network infrastructure provides the high security. It contains the External server, fileserver, client & communication server and database server. These are connected with the switchesand the switches are connected with core swtiches. The ISP provides t he internet for the router. Therouters are connected with the firewall to provide the secure connection.The recent report is portion of the external estimation of ENISA’s activities in 2015. It carriesan in-depth aspects at one of the work packages of ENISA organization which is called as WPK. Itpresents the aim of WPK 3.3 and its particular deliverables, their, outcomes, outputs and results asrecognized in the logic of intervention. By achieving the action under SO3, ENISA goal to support
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document