logo

Impact of Threats on System | Report

16 Pages3327 Words50 Views
   

Added on  2020-02-19

Impact of Threats on System | Report

   Added on 2020-02-19

ShareRelated Documents
Running head: RISK MANAGEMENT
Risk Management
Name of the Student
Name of the University
Author’s Note
Table of Contents
Impact of Threats on System | Report_1
RISK MANAGEMENT
Introduction..........................................................................................................................3
1. ENISA Big Data Security Infrastructure.........................................................................3
2. Top Threats in Enisa and their significance....................................................................5
2.1. Threat due to Information leakage............................................................................5
2.2. Threat due to leaks of data via web application.......................................................5
2.3. Threat due to inadequate design and planning or incorrect adaption.......................6
2.4. Most significant Threat.............................................................................................7
3. Threat agents, impact and threat probability...................................................................7
3.1. Key Threat Agents....................................................................................................7
3.1.1. Threat Agent: Corporation.................................................................................8
3.1.2. Threat Agent: Cyber criminals..........................................................................8
3.1.3. Threat Agent: Cyber terrorists...........................................................................8
3.1.4. Threat Agent: Script kiddies..............................................................................8
3.1.5. Threat Agent: Hacktivists or online social hackers...........................................8
3.1.6. Threat Agent: Employees..................................................................................9
3.1.7. Threat Agent: Nation States...............................................................................9
3.2. Minimizing the impact of threat...............................................................................9
3.3. Trends in threat probability....................................................................................10
4. Improving ETL process.................................................................................................10
5. Current State of IT security...........................................................................................11
Impact of Threats on System | Report_2
RISK MANAGEMENT
Conclusion.........................................................................................................................13
References..........................................................................................................................14
Impact of Threats on System | Report_3
RISK MANAGEMENT
Introduction
The term big data corresponds to the vast amount of data and information present within
a system, which can be utilized for different purposes. The stored data can be analyzed
computationally to reveal the different patterns and trends associated with the human behaviors.
Big data deals with voluminous amounts data both structured and unstructured that different
organizations can use for business purposes (Wu et al., 2014). A wide range of audience can
access this data and therefore, different security and privacy issues remain associated with the
storage of massive amount of digital information. Therefore, different security measures are
needed to be ensured in order maintain the privacy and the integrity of the data. Enisa is facing a
similar big data threat and this report discusses the different threats. The report elaborates the top
threats associated with the organization and the key threat agent (Inukollu, Arsi & Ravuri, 2014).
The report further discusses the steps that could be taken to minimize the impact of the threats on
the system.
1. ENISA Big Data Security Infrastructure
Impact of Threats on System | Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Top Threats in Enisa Big Data Infrastructure
|16
|3661
|205

Case Study on System Risk Management at ENISA
|16
|3810
|174

European Union Agency for Network and Information Security - PDF
|12
|3085
|203

Case study on Risk Management of Big Data
|15
|3274
|170

Risk Management Case Study - Threats Associated With ENISA
|16
|3355
|48

ENISA Big Data Threat Network Security
|14
|3524
|219