logo

BUSI 414 - IT Risk Management Case Study

11 Pages3238 Words47 Views
   

Liberty University

   

IT Risk Management (BUSI 414)

   

Added on  2020-02-24

About This Document

This report will provide an analysis of the security threats that relate to the Big Data, a technology that has gained various aspects in the society ranging from the health, climate, food security, and transport system as well as the smart cities. The report will further answer questions on the top threats which could be regarded as significant and the reasons to why they are.

BUSI 414 - IT Risk Management Case Study

   

Liberty University

   

IT Risk Management (BUSI 414)

   Added on 2020-02-24

ShareRelated Documents
Running head: IT RISK MANAGEMENT1IT risk managementName:Institution Affiliation:
BUSI 414 - IT Risk Management Case Study_1
IT RISK MANAGEMENT2Case Study Review In this case study it is a research which has been conducted by European agency for the Network and the information security which is regarded as ENISA (Barocas & Nissenbaum, 2014). This company usually offers a networking as well as information system security expertise particularly to the European Union member countries, the private organization and various individuals (Ballard, Compert, Jesionowski, Milman, Plants, Rosen & Smith, 2014). This report will provide an analysis to the security threats that relates to the Big Data, a technology to which has gained various aspects in the society that ranges from the health, climate, food security, transport system as well as the smart cities (Davis, Wong & Paterson, 2015). In this report it will further answer questions on the top threats which could be regarded as significant and the reason as to why they are (Barocas & Nissenbaum, 2014). Additionally, it will focus on the key threats agents, what might could occur in order to minimize on the impact on the system, and based on the data which has been provided I will discuss on the threat probability (Davis, Wong & Paterson, 2015). In the research it is also important to highlight how ETL process could be improved and to sum on all these aspect is to highlight if ENISA could be satisfied or not through the current state of the information technology security. Diagram of ENISA Big data security infrastructure.
BUSI 414 - IT Risk Management Case Study_2
IT RISK MANAGEMENT3Figure 1: Diagram for the ENISA Big Data security infrastructure.Top threats There are various data security threat which have been discussed in ENISA report; some of the top threat which could be considered most important and which have great effect particularly when it comes to the security of the Big Data assets and the infrastructure are discussed below;Nefarious threats Based on this landscape report (2016), the nefarious activities usually manipulate the existing data infrastructure through the hackers who uses various software or perhaps a tool (Chance &
BUSI 414 - IT Risk Management Case Study_3
IT RISK MANAGEMENT4Brooks, 2015). Their actions usually leads to interferences to the security of the infrastructure of the Big data for example the software, computing models, hardware as well as the storage models. The major security threats which relates to the nefarious activities are; utilization of the malicious code which is referred to as virus in order to paralyze on the operations of the infrastructure of the Big Data (Chance & Brooks, 2015). Another activity is the identity theft which usually involves stealing of the data systems logins by unauthorized individuals. Another activity is the denial of the service information, which involves the use of the certificate that are rogue as well as the misuse of the audit tools. The nefarious activities in most of the case are rated high due to the fact that in most cases where there is use of the malicious code, it target the large sources of data particularly in big organization or perhaps the government entities. An example was the use of the WannaCry Ransome attack which targeted the major organization data system in 2017.Interception, hijacking and EavesdroppingThis occurs when the packets travel across the network, these are prone to getting altered, lookedat or perhaps hijacked. Hijacking generally occurs whenever a malicious party intercepts the network traffic session and postures as one of the session endpoints. The attacker has the capacity to monitor on the data sources to or perhaps from the target, to have the ability to gatherthe most susceptible data (McNeil, Frey & Embrechts, 2015). This attacks is focused on sniffing the network traffic, but could possibly include observing other type of information streams. Sniffing or even eavesdropping is basically the act of monitoring the traffic on the network whenit comes to the data for instance the plaintext passwords or perhaps configuration data. With merely a simple sniffer packet, the attacker could read conveniently all the plaintext traffic. This threat is amongst the leading most since it is executed via the net as soon as the attacker is able to
BUSI 414 - IT Risk Management Case Study_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Risk Management - Case Study - ITC596
|11
|3284
|69

European Union Agency for Network and Information Security - PDF
|12
|3085
|203

Big Data Security Infrastructure
|15
|3063
|81

Report on ENISA Big Data Security Infrastructure
|13
|3109
|112

ENISA Big Data Threat Network Security
|14
|3524
|219

ENISA Big Data Infrastructure | Assignment
|14
|3649
|302