logo

Cyber Security Risks and Solutions in Cloud Computing

   

Added on  2020-04-07

15 Pages3063 Words81 Views
 | 
 | 
 | 
Running head: IT RISK MANAGEMENTIT Risk ManagementName of the StudentName of the UniversityAuthor’s Note
Cyber Security Risks and Solutions in Cloud Computing_1

1IT RISK MANAGEMENTTable of ContentsIntroduction..........................................................................................................................21. Overview of the case study and illustration of the big data security Infrastructure........21.1 Overview....................................................................................................................21.2. Infrastructure Diagram..............................................................................................32. Top and most significant threats......................................................................................52.1. Most significant threat identified..............................................................................73. Threat Agents, Their Impact and threat probability........................................................74. ETL process Improvement..............................................................................................95. Current State of IT security in ENISA..........................................................................10Conclusion.........................................................................................................................11References..........................................................................................................................12
Cyber Security Risks and Solutions in Cloud Computing_2

2IT RISK MANAGEMENTIntroductionsThe case study discusses the threats and the security issues associated with the process ofdata mining and use of big data. Big data refers to the storage of large amount of Data that can bemined for significant benefits in organizations and business (Wu et al., 2014). These data can bea very useful for business related decision making and therefore holds utmost importance. Thus,there are certain risks associated with the mining of big data. The case study discusses thedifferent threats associated with ENISA and the various processes that can be implemented inelimination of the threats. The different threats agents and the threat mitigation processes arediscussed in the following paragraphs (Inukollu, Arsi & Ravuri, 2014)-1. Overview of the case study and illustration of the big data security Infrastructure1.1 OverviewThe case study focuses on the big data landscape and the ENISA big data threat. Thecontent of the case study puts a light to the different use of big data and the associated risk withthe process of data mining (Wright & De Hert, 2012). The key threat agents associated with thedata breaches due the use of big data is clearly depicted in the case study. It further elaborates theimpact of the big data, which is huge in thriving of the data driven economy. The use of big datais wide in fields such as military applications, fighting terrorism and research work (Gonzalez etal., 2012). Therefore, protecting the process of data mining and ensuring a secure data mining isessential. The case study discusses the process of ETL ( ENISA threat landscape) and suggestsdifferent risk management and mitigation processes for mitigating the risks associated with thebig data landscape ( ENISA 2017). The case study aims at giving providing a clear picture of therisks and threats associated with the big data landscape. The risk is widespread due to the
Cyber Security Risks and Solutions in Cloud Computing_3

3IT RISK MANAGEMENTinvolvement of cloud storage in order to store the big data. The threat infrastructure diagram ofENISA is illustrated below-1.2. Infrastructure Diagram
Cyber Security Risks and Solutions in Cloud Computing_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents