Report on ENISA Big Data Security Infrastructure

Added on -2020-02-19

| 13 pages| 3109 words| 112 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 4 of 13 pages

RUNNING HEAD: ENISA BIG DATA SECURITY INFRASTRUCTURE1ENISA BIG DATA SECURITY INFRASTRUCTUREStudent NameInstitute Name
ENISA BIG DATA SECURITY INFRASTRUCTURE2ContentsOverview of the case study..............................................................................................................3Diagram for the ENISA Big Data security infrastructure...............................................................5Top threats.......................................................................................................................................7Identify and discuss the key Threat Agents. What could be done to minimize their impact on the system?............................................................................................................................................8How could the ETL process be improved? Discuss........................................................................9To sum up, should ENISA be satisfied with its current state of IT Security? Why?....................11Reference.......................................................................................................................................12
ENISA BIG DATA SECURITY INFRASTRUCTURE3Overview of the case studyThe report discuss in detail about the ENISA threat which is based on a landscape of 2014 that isable to provide a detailed explanation associated with the threat based intelligence that consist of cyber related threats and the associated trends. It further discusses about the breach of information that took place in 2014 and done by utilized the weakness connected with the security and many cyber threat agents that can be misused in the business (Olesen, 2016). There is plenty of sloppiness as well and one of the main factors for most of issue in cyber security is also covered here. One can easily find that in many cases there are around fifty percent of the times is because of the case of sloppiness. Thirty four percent of the system functions without any proper base for security control that is one of the important challenges. According to the report, emergences of the technologies like IOT, CPS and mobile based computing along with big data will also make an influence on the landscape of the current threat. It is important to understand here that by cautiously avoiding the usage of big data along mobile based computing for future threats can be ignored quite easily (Skopik et al, 2016). ENISA can further be defined as European Union Agency for Network and Information Security.The system is based on various threats based landscape and as discussed it happened in the year 2014. The whole revelation was about the threat that came along with lots of complex issues. It further attributed to the modifications and success based function that have been conducted by the number of forces in security concern in addition to the proper mobilization of the current cyber society (Weber & Studer, 2016). The actions taken were outstanding and following is the detailed discussion: -
ENISA BIG DATA SECURITY INFRASTRUCTURE41)The complete process is related with botnet Zeus which is later stopped with an infection and the different kind of campaigns to interact especially with number of C&C centers.2)The arrest of the developer of Black hole in 2013 there was major reduction and is done to exploit the overall usage of the kit. 3)Any kind of decrease is also based on amplifying the NTP along with DDoS that usually is an outcome of the overall reduction from the current set of servers. It is usually based on the overall awareness that arises from the community (Rogers et al, 2016).4)The reduction is also based on the injections of SQL with improving in the development knowledge of web. 5)The present demolition of Silk Road with profound based of web based services have also been in some kind of impact especially by the current TOR along with the main attacker of the network.There are many kinds of black spot where the system of SSL as well as TLS has been constantly operating for the sake of securing the small nucleus present on the internet. They are also influenced by the diverse mistakes like execution on HEARTBLEED and many others. There is also some mass level of data theft with elements like shellshock based on vulnerability of shell. The most important influence has been on the elements that can be used with the older type with some engrained software (Leenen & Meyer, 2016). There is also violation of privacy as well with the help of media based channels that have a finished reduction in the trust of the users withthe help of multiple media based channels with complete amount of reduction in the level of trustof the client using varied internet services. The analysis also says that the documents are also associated with the learning that are crucial and significant for the successful level of attacks. These are primarily because some kind of negligence in the present cyber security issues. The

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Premium

$45

Q&A Library Access

Chat support

12

Document Unlocks

4

Answer Unlocks

Students who viewed this