logo

Report | IT Risk Analysis and Security

15 Pages3004 Words30 Views
   

Added on  2020-03-16

Report | IT Risk Analysis and Security

   Added on 2020-03-16

ShareRelated Documents
0IT RISK MANAGEMENTName of the Student Name of the UniversityAuthors Note:
Report | IT Risk Analysis and Security_1
IT RISK MANAGEMENT 1Table of ContentsIntroduction..........................................................................................................................2Question 1............................................................................................................................3Question 2............................................................................................................................4Question 3............................................................................................................................5Question 4............................................................................................................................6Question 5............................................................................................................................7References............................................................................................................................8
Report | IT Risk Analysis and Security_2
IT RISK MANAGEMENT 2Introduction The following report is all about risk analysis and security is vital for the firm to implement proper operation and integration of workflow for development of the system. Development of the given project will ultimately help in development of operation and applying proper methods for analyzing the risk associated with given firm. Operational analysis emphasizes on checking various risks of organization. The report is all about European union Agency and information security is nothing but a network center and security of information experts for private sector and various European citizen. ENISA works with the following sectors and aims in providing advice for good practice in information security. In this report ENISA emphasizes on various threats to Big data technology which plays akey role in various parts like health, food security, climate and various sources of energy. Big data technology has a high level of replication in data storage portion and frequent outsourcing of Big Data technology often leads to breach, leakage and others threats which are specific to this big data technology. Additional information created by Big data can increase the effect of data leaks and various breaches.
Report | IT Risk Analysis and Security_3
IT RISK MANAGEMENT 3Question 1The report is all about European union Agency and information security is nothing but acenter of network and security of information for private sector and various European citizen.ENISA works with the following sectors and aims in providing advice for good practice ininformation security. In this report ENISA emphasizes on various threats to Big data technologywhich plays a key role in various parts like health, food security, climate and various sources ofenergy (Bartsch & Frey, 2017). Big Data is more often useful for collecting data for variousalgorithms, technology and various system (Bendiek,2015). There are mainly source of big datathat is mobile communication device and networks and various web based application. Since theuse of big data technology has increased a lot in the last few years with different adaptation forproper adaptation. Big data technology can help in increasing the productivity and providesbetter decision making in various organization (Bastl, Mareš, & Tvrdá, 2015). It can be expectedthat it can have all the data with application in various domains like science, business andmilitary. On the contrary Big data technology has a various number of risk. Different Big datasystem are becoming more prone to attacks caused by hackers and threat agents. Big data technology has a high level of replication in data storage portion and frequentoutsourcing of Big Data technology often leads to breach, leakage and others threats which arespecific to this big data technology (Catteddu & Hogben, 2015). Additional information createdby Big data can increase the effect of data leaks and various breaches (Christou, 2017). Interestof various big data owners like data owners, data transformers, computation and storage in thebig data area may lead to some conflict which ultimately leads to the creation of complexecosystem where various security measures should be carefully planned and executed (Eininger,Skopik & Fiedler, 2015).
Report | IT Risk Analysis and Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Big Data Threat Landscape of Europe- Assignment
|15
|3480
|152

Analysis of the Big Data Threats- Assignment
|13
|3388
|176

IT Risk Management | Assignment
|13
|3398
|75

Case study on Risk Management of Big Data
|15
|3274
|170

ENISA Big Data Threat Network Security
|14
|3524
|219

European Union Agency for Network and Information Security - PDF
|12
|3085
|203