Impact of Threats on System | Report
16 Pages3327 Words50 Views
Added on 2020-02-19
Impact of Threats on System | Report
Added on 2020-02-19
ShareRelated Documents
Running head: RISK MANAGEMENT
Risk Management
Name of the Student
Name of the University
Author’s Note
Table of Contents
Risk Management
Name of the Student
Name of the University
Author’s Note
Table of Contents
RISK MANAGEMENT
Introduction..........................................................................................................................3
1. ENISA Big Data Security Infrastructure.........................................................................3
2. Top Threats in Enisa and their significance....................................................................5
2.1. Threat due to Information leakage............................................................................5
2.2. Threat due to leaks of data via web application.......................................................5
2.3. Threat due to inadequate design and planning or incorrect adaption.......................6
2.4. Most significant Threat.............................................................................................7
3. Threat agents, impact and threat probability...................................................................7
3.1. Key Threat Agents....................................................................................................7
3.1.1. Threat Agent: Corporation.................................................................................8
3.1.2. Threat Agent: Cyber criminals..........................................................................8
3.1.3. Threat Agent: Cyber terrorists...........................................................................8
3.1.4. Threat Agent: Script kiddies..............................................................................8
3.1.5. Threat Agent: Hacktivists or online social hackers...........................................8
3.1.6. Threat Agent: Employees..................................................................................9
3.1.7. Threat Agent: Nation States...............................................................................9
3.2. Minimizing the impact of threat...............................................................................9
3.3. Trends in threat probability....................................................................................10
4. Improving ETL process.................................................................................................10
5. Current State of IT security...........................................................................................11
Introduction..........................................................................................................................3
1. ENISA Big Data Security Infrastructure.........................................................................3
2. Top Threats in Enisa and their significance....................................................................5
2.1. Threat due to Information leakage............................................................................5
2.2. Threat due to leaks of data via web application.......................................................5
2.3. Threat due to inadequate design and planning or incorrect adaption.......................6
2.4. Most significant Threat.............................................................................................7
3. Threat agents, impact and threat probability...................................................................7
3.1. Key Threat Agents....................................................................................................7
3.1.1. Threat Agent: Corporation.................................................................................8
3.1.2. Threat Agent: Cyber criminals..........................................................................8
3.1.3. Threat Agent: Cyber terrorists...........................................................................8
3.1.4. Threat Agent: Script kiddies..............................................................................8
3.1.5. Threat Agent: Hacktivists or online social hackers...........................................8
3.1.6. Threat Agent: Employees..................................................................................9
3.1.7. Threat Agent: Nation States...............................................................................9
3.2. Minimizing the impact of threat...............................................................................9
3.3. Trends in threat probability....................................................................................10
4. Improving ETL process.................................................................................................10
5. Current State of IT security...........................................................................................11
RISK MANAGEMENT
Introduction
The term big data corresponds to the vast amount of data and information present within
a system, which can be utilized for different purposes. The stored data can be analyzed
computationally to reveal the different patterns and trends associated with the human behaviors.
Big data deals with voluminous amounts data both structured and unstructured that different
organizations can use for business purposes (Wu et al., 2014). A wide range of audience can
access this data and therefore, different security and privacy issues remain associated with the
storage of massive amount of digital information. Therefore, different security measures are
needed to be ensured in order maintain the privacy and the integrity of the data. Enisa is facing a
similar big data threat and this report discusses the different threats. The report elaborates the top
threats associated with the organization and the key threat agent (Inukollu, Arsi & Ravuri, 2014).
The report further discusses the steps that could be taken to minimize the impact of the threats on
the system.
1. ENISA Big Data Security Infrastructure
Introduction
The term big data corresponds to the vast amount of data and information present within
a system, which can be utilized for different purposes. The stored data can be analyzed
computationally to reveal the different patterns and trends associated with the human behaviors.
Big data deals with voluminous amounts data both structured and unstructured that different
organizations can use for business purposes (Wu et al., 2014). A wide range of audience can
access this data and therefore, different security and privacy issues remain associated with the
storage of massive amount of digital information. Therefore, different security measures are
needed to be ensured in order maintain the privacy and the integrity of the data. Enisa is facing a
similar big data threat and this report discusses the different threats. The report elaborates the top
threats associated with the organization and the key threat agent (Inukollu, Arsi & Ravuri, 2014).
The report further discusses the steps that could be taken to minimize the impact of the threats on
the system.
1. ENISA Big Data Security Infrastructure
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Top Threats in Enisa Big Data Infrastructurelg...
|16
|3661
|205
Case Study on System Risk Management at ENISAlg...
|16
|3810
|174
European Union Agency for Network and Information Security - PDFlg...
|12
|3085
|203
Case study on Risk Management of Big Datalg...
|15
|3274
|170
Risk Management Case Study - Threats Associated With ENISAlg...
|16
|3355
|48
ENISA Big Data Threat Network Securitylg...
|14
|3524
|219