Ask a question from expert

Ask now

Report on ENISA Big Data Security Infrastructure

13 Pages3109 Words112 Views
   

Added on  2020-02-19

Report on ENISA Big Data Security Infrastructure

   Added on 2020-02-19

BookmarkShareRelated Documents
RUNNING HEAD: ENISA BIG DATA SECURITY INFRASTRUCTURE1ENISA BIG DATA SECURITY INFRASTRUCTUREStudent NameInstitute Name
Report on ENISA Big Data Security Infrastructure_1
ENISA BIG DATA SECURITY INFRASTRUCTURE2ContentsOverview of the case study..............................................................................................................3Diagram for the ENISA Big Data security infrastructure...............................................................5Top threats.......................................................................................................................................7Identify and discuss the key Threat Agents. What could be done to minimize their impact on the system?............................................................................................................................................8How could the ETL process be improved? Discuss........................................................................9To sum up, should ENISA be satisfied with its current state of IT Security? Why?....................11Reference.......................................................................................................................................12
Report on ENISA Big Data Security Infrastructure_2
ENISA BIG DATA SECURITY INFRASTRUCTURE3Overview of the case studyThe report discuss in detail about the ENISA threat which is based on a landscape of 2014 that isable to provide a detailed explanation associated with the threat based intelligence that consist of cyber related threats and the associated trends. It further discusses about the breach of information that took place in 2014 and done by utilized the weakness connected with the security and many cyber threat agents that can be misused in the business (Olesen, 2016). There is plenty of sloppiness as well and one of the main factors for most of issue in cyber security is also covered here. One can easily find that in many cases there are around fifty percent of the times is because of the case of sloppiness. Thirty four percent of the system functions without any proper base for security control that is one of the important challenges. According to the report, emergences of the technologies like IOT, CPS and mobile based computing along with big data will also make an influence on the landscape of the current threat. It is important to understand here that by cautiously avoiding the usage of big data along mobile based computing for future threats can be ignored quite easily (Skopik et al, 2016). ENISA can further be defined as European Union Agency for Network and Information Security.The system is based on various threats based landscape and as discussed it happened in the year 2014. The whole revelation was about the threat that came along with lots of complex issues. It further attributed to the modifications and success based function that have been conducted by the number of forces in security concern in addition to the proper mobilization of the current cyber society (Weber & Studer, 2016). The actions taken were outstanding and following is the detailed discussion: -
Report on ENISA Big Data Security Infrastructure_3
ENISA BIG DATA SECURITY INFRASTRUCTURE41)The complete process is related with botnet Zeus which is later stopped with an infection and the different kind of campaigns to interact especially with number of C&C centers.2)The arrest of the developer of Black hole in 2013 there was major reduction and is done to exploit the overall usage of the kit. 3)Any kind of decrease is also based on amplifying the NTP along with DDoS that usually is an outcome of the overall reduction from the current set of servers. It is usually based on the overall awareness that arises from the community (Rogers et al, 2016).4)The reduction is also based on the injections of SQL with improving in the development knowledge of web. 5)The present demolition of Silk Road with profound based of web based services have also been in some kind of impact especially by the current TOR along with the main attacker of the network.There are many kinds of black spot where the system of SSL as well as TLS has been constantly operating for the sake of securing the small nucleus present on the internet. They are also influenced by the diverse mistakes like execution on HEARTBLEED and many others. There is also some mass level of data theft with elements like shellshock based on vulnerability of shell. The most important influence has been on the elements that can be used with the older type with some engrained software (Leenen & Meyer, 2016). There is also violation of privacy as well with the help of media based channels that have a finished reduction in the trust of the users withthe help of multiple media based channels with complete amount of reduction in the level of trustof the client using varied internet services. The analysis also says that the documents are also associated with the learning that are crucial and significant for the successful level of attacks. These are primarily because some kind of negligence in the present cyber security issues. The
Report on ENISA Big Data Security Infrastructure_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ENISA Big Data Threat Network Security
|14
|3524
|219

ENISA Threat Landscape | Report
|8
|1588
|308

Top Threats in Enisa Big Data Infrastructure
|16
|3661
|205

Big Data Security Infrastructure
|15
|3063
|81

(Solved) ENISA Case Study docx.
|15
|3288
|124

ENISA Big Data Infrastructure | Assignment
|14
|3649
|302