logo

Enhancing ENISA Big Data Infrastructure Security Features

   

Added on  2019-11-19

14 Pages3571 Words182 Views
 | 
 | 
 | 
Running head: IT RISK MANAGEMENTIT RISK MANAGEMENTName of the StudentName of the UniversityAuthor Note
Enhancing ENISA Big Data Infrastructure Security Features_1

1IT RISK MANAGEMENTTable of ContentsIntroduction................................................................................................................................21. Overview and ENISA big data Infrastructure........................................................................21.1 Overview..............................................................................................................................22. Top Threats associated with ENISA and their significance...................................................52.1. Most significant Threat.......................................................................................................63. Threat agents, impact and threat probability..........................................................................73.1. Minimization of the Impact of the Threat...........................................................................83.2. Threat and Probability trends..............................................................................................94. Improving ETL process..........................................................................................................95. Current State of IT security..................................................................................................10Conclusion................................................................................................................................10References................................................................................................................................11
Enhancing ENISA Big Data Infrastructure Security Features_2

2IT RISK MANAGEMENTIntroductionThe case study, which has been studied for the development of this report mainly,deals with the issues concerned with the storage of huge amount of data, which is there to beaccesses by public for the use in their business. The proper use of a Big Data analysis andstorage server will be able to significantly benefit the organization. However, there areseveral security issues present with the use and accessibility of big data that ultimately endswith the cause of data breach and loss in data . The case study has been compiled to deal withthe threats and issues, which are faced by ENISA (Wu et al., 2014). The key threat agents ofENISA has also been discussed in the case study. This report discusses the procedures toimplement to eliminate the threats from the data system and the various security issuesassociated with ENISA (Inukollu, Arsi & Ravuri, 2014). The treat infrastructure of ENISAand the key threat agents of the organization has also been discussed. A detailed analysis ofthe ENISA case study has been discussed in the following sections. 1. Overview and ENISA big data InfrastructureThe following is a brief overview of the ENISA case study and provides aninfrastructure diagram of the ENISA:1.1 OverviewThe ENISA case study is focused on the broader topic of big data with theimplementation procedure and the threats associated with the use of big data. The rise in theproblems associated with the security and data breaches is a matter of huge concern intoday’s world and thus proper measures has to be taken to minimize such risks and breaches.The case study deals with the different threats associated with the use of big data in today’stechnology and the significant roles, which are present in various aspects of the society
Enhancing ENISA Big Data Infrastructure Security Features_3

3IT RISK MANAGEMENT(Wright & De Hert, 2012). For a large data driven economical business the use of big data isof huge significance. In recent times big data has found its usage in the field of militaryinstitutions to fight terrorism and in the field of research work. Thus, it can be said that thetechnology offers a large number of advantages and can be considered a major source of dataand information. However the large source of information has been found to be exposed to anumber of threats and has also received attacks form subsequent threat agents (Gonzalez etal., 2012). The systems associated with the big data can also be used in a wide range ofapplications. The case study has been constructed to understand the different threats alreadypresent in the system and the possible steps that can be taken to eliminate the threat agentsassociated with the use of big data. The case study also provides an overview of the riskmanagement process and strategies for the elimination of the risks associated with the use ofthe big data technology (Theoharidou et al., 2013). The case study emphasizes the cloudstorages as a major storage place for the big data. Cloud storage has always been consideredto be associated with different types of risks and problems which needs to be eliminated forthe safety of the data breach and for the minimization of data loss (Tan et al., 2014). The casestudy also provides a detailed description of the infrastructure architecture of the big datastorage modules, which comprises of a high-leveled conceptual model. The prominent layersin the big data architecture consists of the data sources, storage modules, computing modelsand the presentation layers. The big data taxonomy discussed in the case study provides abrief overview of the assets and the structure associated with big data (Theoharidou, Tsalis &Gritzalis, 2013). The major components of any big data server is the analytics, data securityand the structure to be followed for the privacy of the data. The infrastructure of the ENISAhas been discussed below in the form of a diagram:
Enhancing ENISA Big Data Infrastructure Security Features_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents