logo

Risk Analysis and Security- ENISA Case Study

15 Pages3776 Words213 Views
   

Added on  2019-11-26

Risk Analysis and Security- ENISA Case Study

   Added on 2019-11-26

ShareRelated Documents
Running head: RISK ANALYSIS AND SECURITY: ENISA CASE STUDYRisk Analysis and Security: ENISA Case StudyName of the StudentName of UniversityAuthor’s note
Risk Analysis and Security- ENISA Case Study_1
1 RISK ANALYSIS AND SECURITY: ENISA CASE STUDYTable of ContentsIntroduction......................................................................................................................................21. Overview of ENISA Case Study and Illustration of ENISA Big Data Security Infrastructure.22. The Top Threats in ENISA..........................................................................................................53. Key Threat Agents and Ways to Minimize their Impact.............................................................94. ETL Process Improvement........................................................................................................105. IT Security of ENISA...............................................................................................................11Conclusion.....................................................................................................................................11References......................................................................................................................................12
Risk Analysis and Security- ENISA Case Study_2
2 RISK ANALYSIS AND SECURITY: ENISA CASE STUDYIntroductionENISA stands for European Union Agency for Network and Information Security. It isknown be centre part or core of the expertise of information security of network. ENISA isresponsible for the development of communities across the borders. It provides great support tothe members of EU and helps to implement EU legislation. They have big data that is a hugecollection of set of data. The big data is analyzed in details to find patterns. Implementation ofrisk management is mandatory for every organization for effective operation (Mahajan, Gaba &Chauhan, 2016).This report discusses about the several top threats that exist in ENISA. It also talks aboutthe most significant threat among the rest. This report points out the main threat agents (Kao etal. 2014).The case study’s overview is provided along with the security infrastructure of ENISA.Risk or threat minimization methods have also been discussed here. Improvement process ofETL is explained in brief. At the end of the report it says gives an explanation why ENISA issatisfied with its existing security infrastructure or not. 1. Overview of ENISA Case Study and Illustration of ENISA Big DataSecurity InfrastructureBig data is used in ENISA. Big data contains a collection of information. Data isintegrated from several functional departments in order to point out any type of commonality sothat customer or consumer preferences can be identified. In this case of ENISA, there are manythreats of top level that are playing role (Patil & Seshadri, 2014). Big data analytics figures out
Risk Analysis and Security- ENISA Case Study_3
3 RISK ANALYSIS AND SECURITY: ENISA CASE STUDYthe risk exposure area. Threats occur due to presence of key agents of threat. Risk management isneeded for the risk mitigation purpose. There are five main groups of threats. The privacy factorof big data plays a major role which focuses on the model for potential development of riskmitigation and analysis (Patil & Seshadri, 2014). The effectiveness of ENISA will reach thehighest level if they deploy proper strategy for big data analysis. Solutions that are based oninformation and communication technology are implemented for the purpose of minimizing therisk factor in ENISA. The operations will become effective if data and threats are managed in aproper way (Vatsalan et al.,2017). There is a gap analysis presented in this case study of ENISA.The comparison of threats with their countermeasures is done in gap analysis. Data is oriented inthe traditional data threats. There needs to be replacement of the legacy system with big data.The big data architecture, environment, assets as well as taxonomy are discussed in this casestudy. The key agents of threats are pointed out. Cryptography is the main mitigation schemethat is deployed by ENISA. These mitigation scheme falls under the category of good practicesthat are present in the case study. The main aim for protecting data is to bring about four main characteristics of data likeintegrity, non repudiation, availability as well as confidentiality.
Risk Analysis and Security- ENISA Case Study_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Case Study on System Risk Management at ENISA
|16
|3810
|174

Risk Analysis and Security: ENISA Case Study
|17
|4120
|61

Big Data Security Infrastructure
|15
|3063
|81

Risk Management | Enisa Case Study
|16
|3811
|262

Risk Analysis and Security | ENISA Case Study
|15
|3196
|160

Risk Management Case Study - Threats Associated With ENISA
|16
|3355
|48