Ask a question from expert

Ask now

Big Data Security Infrastructure

15 Pages3063 Words81 Views
   

Added on  2020-04-07

About This Document

Overview of the case study and illustration of the big data security Infrastructure 2 1.1 Overview 2 1.2. Current State of IT security in ENISA 10 Conclusion 11 References 12 Introductions The case study discusses the threats and the security issues associated with the process of data mining and use of big data. The case study discusses the process of ETL ( ENISA threat landscape) and suggests different risk management and mitigation processes for mitigating the risks associated with the big data landscape ( ENISA 2017).

Big Data Security Infrastructure

   Added on 2020-04-07

BookmarkShareRelated Documents
Running head: IT RISK MANAGEMENTIT Risk ManagementName of the StudentName of the UniversityAuthor’s Note
Big Data Security Infrastructure_1
1IT RISK MANAGEMENTTable of ContentsIntroduction..........................................................................................................................21. Overview of the case study and illustration of the big data security Infrastructure........21.1 Overview....................................................................................................................21.2. Infrastructure Diagram..............................................................................................32. Top and most significant threats......................................................................................52.1. Most significant threat identified..............................................................................73. Threat Agents, Their Impact and threat probability........................................................74. ETL process Improvement..............................................................................................95. Current State of IT security in ENISA..........................................................................10Conclusion.........................................................................................................................11References..........................................................................................................................12
Big Data Security Infrastructure_2
2IT RISK MANAGEMENTIntroductionsThe case study discusses the threats and the security issues associated with the process ofdata mining and use of big data. Big data refers to the storage of large amount of Data that can bemined for significant benefits in organizations and business (Wu et al., 2014). These data can bea very useful for business related decision making and therefore holds utmost importance. Thus,there are certain risks associated with the mining of big data. The case study discusses thedifferent threats associated with ENISA and the various processes that can be implemented inelimination of the threats. The different threats agents and the threat mitigation processes arediscussed in the following paragraphs (Inukollu, Arsi & Ravuri, 2014)-1. Overview of the case study and illustration of the big data security Infrastructure1.1 OverviewThe case study focuses on the big data landscape and the ENISA big data threat. Thecontent of the case study puts a light to the different use of big data and the associated risk withthe process of data mining (Wright & De Hert, 2012). The key threat agents associated with thedata breaches due the use of big data is clearly depicted in the case study. It further elaborates theimpact of the big data, which is huge in thriving of the data driven economy. The use of big datais wide in fields such as military applications, fighting terrorism and research work (Gonzalez etal., 2012). Therefore, protecting the process of data mining and ensuring a secure data mining isessential. The case study discusses the process of ETL ( ENISA threat landscape) and suggestsdifferent risk management and mitigation processes for mitigating the risks associated with thebig data landscape ( ENISA 2017). The case study aims at giving providing a clear picture of therisks and threats associated with the big data landscape. The risk is widespread due to the
Big Data Security Infrastructure_3
3IT RISK MANAGEMENTinvolvement of cloud storage in order to store the big data. The threat infrastructure diagram ofENISA is illustrated below-1.2. Infrastructure Diagram
Big Data Security Infrastructure_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risk Management Case Study - Threats Associated With ENISA
|16
|3355
|48

Top Threats in Enisa Big Data Infrastructure
|16
|3661
|205

European Union Agency for Network and Information Security - PDF
|12
|3085
|203

Risk Management | Enisa Case Study
|16
|3811
|262

Risk Analysis and Security- ENISA Case Study
|15
|3776
|213

IT Risk Management | ENISA Case Study
|14
|3571
|182