Information Technology (IT) Risk Management

Added on - Nov 2019

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 4 of 18 pages
Running Head: IT RISK MANAGEMENTIT RISK MANAGEMENTName of the StudentName of the University
1IT RISK MANAGEMENTTable of ContentsIntroduction................................................................................................................................2Question 1..................................................................................................................................3Question 2..................................................................................................................................5Question 3..................................................................................................................................7Question 4................................................................................................................................10Question 5................................................................................................................................12Conclusion................................................................................................................................14References................................................................................................................................16
2IT RISK MANAGEMENTIntroductionBig Data often indicates the designated palette of algorithms, system employment andtechnology that collects the data of unmatched values, variety and volume. This extraction isdone by massive amount of analytics that are advanced and has the ability to parallelcomputation. The Big Data sources are diverse and are in large number. The multimediasensors are distributed over several aspects mobile telecommunication devices, IoT (Internetof Things), business process distribution and other web-based applications. These are allcandidate data providers. With the increase of Big Data algorithms and technologies,aregradually increasing the effectiveness in decision-making in complex communities andorganization. But the increase of benefits there are also increment of malicious technologiesthat creates risks to the organization. ENISA discusses the above issue in this research paperand explores the aspects of both the importance and risks related to Big Data.
3IT RISK MANAGEMENTQuestion 1Provide a brief overview of the case study and prepare a diagram for the ENISA Big Datasecurity infrastructure.For the situation investigation of ENISA, there is an elaboration on dangers that areidentified with Big Data. There has been highly picked up footing inside most recent coupleof years and consequently the information stockpiling and data innovation has been expectedto assume a genuine part on a few new viewpoints in the general public (Marinos, 2013). Theperspectives that must be create and influenced by the improvement of data innovation andBig information are nourishment security, wellbeing security, atmosphere and assets that areproficient to vitality, shrewd transport framework and savvy urban communities. Thepotential effect of the Big Data has been recognized by the European Commission bydistinguishing the vital approach in the Big Data. The information is accordingly possible tothe financial drive in the authoritative framework. In the field of science and research there isadditionally a huge effect of the Big Data that keeps on raising. In this way, numerous officesand foundation everywhere throughout the globe are wanting to dispatch the Big Dataventures for better misuse of information examination and distributed computing. Innovationsof Big Data can likewise be utilized as a part of the use of military field, for example, battlepleasing or battling virtual or genuine psychological warfare. Along these lines distinguishingand gathering the data from heterogeneous sources from any genuine recorded or opensources has an extraordinary effect (Marinos, Belmonte &Rekleitis, 2014). Cutting edge andvery novel ICT frameworks are utilized as a part of the approach of Big Data. Yet, incrementin the utilization of this Big Data innovation has likewise as often as possible expanded theodds of digital assaults, information breaks and hacking. The increments of this sort ofdifficulties are both slanting the number in complex and effect. By increment in the quantity
Desklib Logo
You are reading a preview
Upload your documents to download or

Become a Desklib member to get access