ENISA Case Study | Risk Analysis and Security Report

Added on - Nov 2019

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 4 of 17 pages
Running head: RISK ANALYSIS AND SECURITY: ENISA CASE STUDYRisk Analysis and Security: ENISA case studyName of the Student:Student ID:Name of the University:Author’s note:
1RISK ANALYSIS AND SECURITY: ENISA CASE STUDYTable of ContentsIntroduction......................................................................................................................................21. Scenario and diagram of Big Data security infrastructure...........................................................21.1 Overview of ENISA case study.................................................................................................21.2 ENISA Big Data Security Infrastructure Diagram....................................................................32. Explanation of the Top Threat in the ENISA..............................................................................73. Key Threat Agents and their Impact Reduction Options.............................................................94. Improvement of ETL process....................................................................................................125. Justification of IT security in ENISA........................................................................................13Conclusion.....................................................................................................................................13References......................................................................................................................................14
2RISK ANALYSIS AND SECURITY: ENISA CASE STUDYIntroductionRisk analysis as well as security is considered as crucial for enterprises in order to deployeffective operations along with integration of development of the system. In this perspective,development of the project would assist to integrate the process of development of operations aswell as apply effective functions within the particular organization. Moreover, operationalprocessing can be implied in order to form analysis risks associated with the organization. Theoperational processing can be implied in order to form analysis of risks might be faced by theorganizations at the time of performing operations as well as functions based on development ofoperations for integration of functions for procedures of the enterprise.The report would assist the process of integrating the functions and operations of theorganization in order to develop risk assessment as well as analysis. In addition, it would tendevaluating the role of technology for implementation of effective risk through analysing the casestudy of ENISA. Practicing big data strategy would enhance operations within the organization.On the other hand, the use of big data in the organization has identified the issues as well asthreats of security for the enterprise. Thus, analysis of threats of Big data strategy for ENISAwould describe agents of threats.1. Scenario and diagram of Big Data security infrastructure1.1 Overview of ENISA case studyThe organization had implemented big data analytics in order to develop effectiveoperations as well as growth of the organization. ENISA implied big data strategy inside theorganization in order to gain competitive advantages. In this perspective, risks as well as threatmanagement need to be implied for developing effective growth of operations. Big data threats
3RISK ANALYSIS AND SECURITY: ENISA CASE STUDYwould result in development of occasional threats for ENISA in integrating the system within theorganization. The enterprise is considered as one of the effective operation system, which iscapable monitoring flow of the operations within the enterprise as well as imply efficient securitysystem inside the enterprise(Chen, Mao& Liu, 2014). However, privacy in big data is consideredas major factor playing a crucial role in implantation of development model for ENISA. In thisperspective, operations of the enterprise would be highly enhanced through utilization of big datastrategy inside the organization.On the other hand, ENSIA had applied ICT solutions improving security functions inorder to manage big data strategy in the enterprise (Demchenko et al.,2013).Various owners areproviding various models for the transformation of the ICT devices in the organisation includingdata owners, data transformers and computation(Kshetri, 2014). These models helps in providingeffective management if the data and security to the data and information. There are variouspractices that are analytics in the organisation for managing threat and management of data usedy the organisation. The process of operating in the organizations implied in the risk managementfor acquiring the security of information and data in the organisation. Therefore, thedevelopment of the risk management assessment helps in maintaining security of data as well asinformation in the enterprise.1.2 ENISA Big Data Security Infrastructure DiagramThe framework of the ENISA has been properly structured of operating effectively in thebig data strategy. Therefore, the big data infrastructure helped in maintaining the data sources,data storage and analytics with computing models under the presentation layer. In addition, the
Desklib Logo
You are reading a preview
Upload your documents to download or

Become a Desklib member to get access