logo

Risk Management in ENISA: A Case Study

   

Added on  2019-11-20

17 Pages3802 Words351 Views
 | 
 | 
 | 
Running head: RISK ANALYSIS AND SECURITY: ENISA CASE STUDYRisk Analysis and Security: ENISA case studyName of the Student:Student ID:Name of the University:Author’s note:
Risk Management in ENISA: A Case Study_1

1RISK ANALYSIS AND SECURITY: ENISA CASE STUDYTable of ContentsIntroduction......................................................................................................................................21. Scenario and diagram of Big Data security infrastructure...........................................................21.1 Overview of ENISA case study.................................................................................................21.2 ENISA Big Data Security Infrastructure Diagram....................................................................32. Explanation of the Top Threat in the ENISA..............................................................................73. Key Threat Agents and their Impact Reduction Options.............................................................94. Improvement of ETL process....................................................................................................125. Justification of IT security in ENISA........................................................................................13Conclusion.....................................................................................................................................13References......................................................................................................................................14
Risk Management in ENISA: A Case Study_2

2RISK ANALYSIS AND SECURITY: ENISA CASE STUDYIntroductionRisk analysis as well as security is considered as crucial for enterprises in order to deployeffective operations along with integration of development of the system. In this perspective,development of the project would assist to integrate the process of development of operations aswell as apply effective functions within the particular organization. Moreover, operationalprocessing can be implied in order to form analysis risks associated with the organization. Theoperational processing can be implied in order to form analysis of risks might be faced by theorganizations at the time of performing operations as well as functions based on development ofoperations for integration of functions for procedures of the enterprise.The report would assist the process of integrating the functions and operations of theorganization in order to develop risk assessment as well as analysis. In addition, it would tendevaluating the role of technology for implementation of effective risk through analysing the casestudy of ENISA. Practicing big data strategy would enhance operations within the organization.On the other hand, the use of big data in the organization has identified the issues as well asthreats of security for the enterprise. Thus, analysis of threats of Big data strategy for ENISAwould describe agents of threats.1. Scenario and diagram of Big Data security infrastructure1.1 Overview of ENISA case studyThe organization had implemented big data analytics in order to develop effectiveoperations as well as growth of the organization. ENISA implied big data strategy inside theorganization in order to gain competitive advantages. In this perspective, risks as well as threatmanagement need to be implied for developing effective growth of operations. Big data threats
Risk Management in ENISA: A Case Study_3

3RISK ANALYSIS AND SECURITY: ENISA CASE STUDYwould result in development of occasional threats for ENISA in integrating the system within theorganization. The enterprise is considered as one of the effective operation system, which iscapable monitoring flow of the operations within the enterprise as well as imply efficient securitysystem inside the enterprise(Chen, Mao& Liu, 2014). However, privacy in big data is consideredas major factor playing a crucial role in implantation of development model for ENISA. In thisperspective, operations of the enterprise would be highly enhanced through utilization of big datastrategy inside the organization. On the other hand, ENSIA had applied ICT solutions improving security functions inorder to manage big data strategy in the enterprise (Demchenko et al.,2013).Various owners areproviding various models for the transformation of the ICT devices in the organisation includingdata owners, data transformers and computation(Kshetri, 2014). These models helps in providingeffective management if the data and security to the data and information. There are variouspractices that are analytics in the organisation for managing threat and management of data usedy the organisation. The process of operating in the organizations implied in the risk managementfor acquiring the security of information and data in the organisation. Therefore, thedevelopment of the risk management assessment helps in maintaining security of data as well asinformation in the enterprise. 1.2 ENISA Big Data Security Infrastructure DiagramThe framework of the ENISA has been properly structured of operating effectively in thebig data strategy. Therefore, the big data infrastructure helped in maintaining the data sources,data storage and analytics with computing models under the presentation layer. In addition, the
Risk Management in ENISA: A Case Study_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents