The provided content discusses the threat probability of various cyber-security breaches, including manipulation of network traffic, interception of radiation, and leakage of data and application. The trend and probability of these threats are also highlighted. Additionally, the importance of improving the Extract, Transform, and Load (ETL) process using Hadoop for big data management is emphasized. Furthermore, the evaluation of the current state of IT security on ENISA is discussed, highlighting the major problem of scalability in big data management. Finally, recommendations for securing sensitive data are provided, including adapting practices to changing circumstances and using standardized activities and rules.