logo

Information Technology (IT) Risk Management

18 Pages4070 Words295 Views
   

Added on  2019-11-20

Information Technology (IT) Risk Management

   Added on 2019-11-20

ShareRelated Documents
Running Head: IT RISK MANAGEMENTIT RISK MANAGEMENTName of the StudentName of the University
Information Technology (IT) Risk Management_1
1IT RISK MANAGEMENTTable of ContentsIntroduction................................................................................................................................2Question 1..................................................................................................................................3Question 2..................................................................................................................................5Question 3..................................................................................................................................7Question 4................................................................................................................................10Question 5................................................................................................................................12Conclusion................................................................................................................................14References................................................................................................................................16
Information Technology (IT) Risk Management_2
2IT RISK MANAGEMENTIntroductionBig Data often indicates the designated palette of algorithms, system employment andtechnology that collects the data of unmatched values, variety and volume. This extraction isdone by massive amount of analytics that are advanced and has the ability to parallelcomputation. The Big Data sources are diverse and are in large number. The multimediasensors are distributed over several aspects mobile telecommunication devices, IoT (Internetof Things), business process distribution and other web-based applications. These are allcandidate data providers. With the increase of Big Data algorithms and technologies,aregradually increasing the effectiveness in decision-making in complex communities andorganization. But the increase of benefits there are also increment of malicious technologiesthat creates risks to the organization. ENISA discusses the above issue in this research paperand explores the aspects of both the importance and risks related to Big Data.
Information Technology (IT) Risk Management_3
3IT RISK MANAGEMENTQuestion 1Provide a brief overview of the case study and prepare a diagram for the ENISA Big Datasecurity infrastructure.For the situation investigation of ENISA, there is an elaboration on dangers that areidentified with Big Data. There has been highly picked up footing inside most recent coupleof years and consequently the information stockpiling and data innovation has been expectedto assume a genuine part on a few new viewpoints in the general public (Marinos, 2013). Theperspectives that must be create and influenced by the improvement of data innovation andBig information are nourishment security, wellbeing security, atmosphere and assets that areproficient to vitality, shrewd transport framework and savvy urban communities. Thepotential effect of the Big Data has been recognized by the European Commission bydistinguishing the vital approach in the Big Data. The information is accordingly possible tothe financial drive in the authoritative framework. In the field of science and research there isadditionally a huge effect of the Big Data that keeps on raising. In this way, numerous officesand foundation everywhere throughout the globe are wanting to dispatch the Big Dataventures for better misuse of information examination and distributed computing. Innovationsof Big Data can likewise be utilized as a part of the use of military field, for example, battlepleasing or battling virtual or genuine psychological warfare. Along these lines distinguishingand gathering the data from heterogeneous sources from any genuine recorded or opensources has an extraordinary effect (Marinos, Belmonte &Rekleitis, 2014). Cutting edge andvery novel ICT frameworks are utilized as a part of the approach of Big Data. Yet, incrementin the utilization of this Big Data innovation has likewise as often as possible expanded theodds of digital assaults, information breaks and hacking. The increments of this sort ofdifficulties are both slanting the number in complex and effect. By increment in the quantity
Information Technology (IT) Risk Management_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment | IT Risk Management Report
|15
|3626
|255

Big Data Analysis | ENISA
|16
|3718
|133

Big Data: A Case Study
|16
|3893
|157

ITC596 - IT Risk Management - Report
|17
|4057
|40

Assignment on Big Data Security
|9
|2695
|202

Big Data Threat Landscape of Europe- Assignment
|15
|3480
|152