Ask a question from expert

Ask now

IT Risk Management | ENISA Case Study

14 Pages3571 Words182 Views
   

Added on  2019-11-19

IT Risk Management | ENISA Case Study

   Added on 2019-11-19

BookmarkShareRelated Documents
Running head: IT RISK MANAGEMENTIT RISK MANAGEMENTName of the StudentName of the UniversityAuthor Note
IT Risk Management | ENISA Case Study_1
1IT RISK MANAGEMENTTable of ContentsIntroduction................................................................................................................................21. Overview and ENISA big data Infrastructure........................................................................21.1 Overview..............................................................................................................................22. Top Threats associated with ENISA and their significance...................................................52.1. Most significant Threat.......................................................................................................63. Threat agents, impact and threat probability..........................................................................73.1. Minimization of the Impact of the Threat...........................................................................83.2. Threat and Probability trends..............................................................................................94. Improving ETL process..........................................................................................................95. Current State of IT security..................................................................................................10Conclusion................................................................................................................................10References................................................................................................................................11
IT Risk Management | ENISA Case Study_2
2IT RISK MANAGEMENTIntroductionThe case study, which has been studied for the development of this report mainly,deals with the issues concerned with the storage of huge amount of data, which is there to beaccesses by public for the use in their business. The proper use of a Big Data analysis andstorage server will be able to significantly benefit the organization. However, there areseveral security issues present with the use and accessibility of big data that ultimately endswith the cause of data breach and loss in data . The case study has been compiled to deal withthe threats and issues, which are faced by ENISA (Wu et al., 2014). The key threat agents ofENISA has also been discussed in the case study. This report discusses the procedures toimplement to eliminate the threats from the data system and the various security issuesassociated with ENISA (Inukollu, Arsi & Ravuri, 2014). The treat infrastructure of ENISAand the key threat agents of the organization has also been discussed. A detailed analysis ofthe ENISA case study has been discussed in the following sections. 1. Overview and ENISA big data InfrastructureThe following is a brief overview of the ENISA case study and provides aninfrastructure diagram of the ENISA:1.1 OverviewThe ENISA case study is focused on the broader topic of big data with theimplementation procedure and the threats associated with the use of big data. The rise in theproblems associated with the security and data breaches is a matter of huge concern intoday’s world and thus proper measures has to be taken to minimize such risks and breaches.The case study deals with the different threats associated with the use of big data in today’stechnology and the significant roles, which are present in various aspects of the society
IT Risk Management | ENISA Case Study_3
3IT RISK MANAGEMENT(Wright & De Hert, 2012). For a large data driven economical business the use of big data isof huge significance. In recent times big data has found its usage in the field of militaryinstitutions to fight terrorism and in the field of research work. Thus, it can be said that thetechnology offers a large number of advantages and can be considered a major source of dataand information. However the large source of information has been found to be exposed to anumber of threats and has also received attacks form subsequent threat agents (Gonzalez etal., 2012). The systems associated with the big data can also be used in a wide range ofapplications. The case study has been constructed to understand the different threats alreadypresent in the system and the possible steps that can be taken to eliminate the threat agentsassociated with the use of big data. The case study also provides an overview of the riskmanagement process and strategies for the elimination of the risks associated with the use ofthe big data technology (Theoharidou et al., 2013). The case study emphasizes the cloudstorages as a major storage place for the big data. Cloud storage has always been consideredto be associated with different types of risks and problems which needs to be eliminated forthe safety of the data breach and for the minimization of data loss (Tan et al., 2014). The casestudy also provides a detailed description of the infrastructure architecture of the big datastorage modules, which comprises of a high-leveled conceptual model. The prominent layersin the big data architecture consists of the data sources, storage modules, computing modelsand the presentation layers. The big data taxonomy discussed in the case study provides abrief overview of the assets and the structure associated with big data (Theoharidou, Tsalis &Gritzalis, 2013). The major components of any big data server is the analytics, data securityand the structure to be followed for the privacy of the data. The infrastructure of the ENISAhas been discussed below in the form of a diagram:
IT Risk Management | ENISA Case Study_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risk Management Case Study - Threats Associated With ENISA
|16
|3355
|48

Big Data Security Infrastructure
|15
|3063
|81

European Union Agency for Network and Information Security - PDF
|12
|3085
|203

Top Threats in Enisa Big Data Infrastructure
|16
|3661
|205

Case study on Risk Management of Big Data
|15
|3274
|170

Risk Management | Enisa Case Study
|16
|3811
|262