logo

Risk Analysis and Security | ENISA Case Study

15 Pages3196 Words160 Views
   

Added on  2019-11-20

Risk Analysis and Security | ENISA Case Study

   Added on 2019-11-20

ShareRelated Documents
Running head: RISK ANALYSIS AND SECURITY: ENISA CASE STUDYRisk Analysis and Security: ENISA case studyName of the Student:Student ID:Name of the University:Author’s note:
Risk Analysis and Security | ENISA Case Study_1
1RISK ANALYSIS AND SECURITY: ENISA CASE STUDYTable of ContentsIntroduction..........................................................................................................................31. Scenario of Big Data security infrastructure...................................................................31.2 Big Data security infrastructure for ENISA..................................................................52. Top Threat in the ENISA.................................................................................................83. Key Threat Agents and their Impact Reduction Options.................................................94. Enhancement of ETL process........................................................................................125. Justification of IT security in ENISA............................................................................12Conclusion.........................................................................................................................13References..........................................................................................................................14
Risk Analysis and Security | ENISA Case Study_2
2RISK ANALYSIS AND SECURITY: ENISA CASE STUDYIntroductionRisk analysis and security is considered as important for an organization to implementeffective operations as well as integration of improving the system. In this point of view,improvement of the project would help to incorporate the procedure of advancement ofoperations and in addition apply successful capacities inside the specific organization. Inaddition, operational processing can be suggested keeping in mind the end goal to shape riskanalysis related with the association. The operational preparing can be suggested with a specificend goal to shape investigation of dangers may be confronted by the associations at the season ofperforming operations and in addition capacities in light of advancement of operations for mix ofcapacities for strategies of the undertaking. The report would help the way toward coordinating the capacities and operations of theassociation so as to create risk assessment as well as analysis. Along with these, it would tendassessing the part of innovation for execution of effective risk through breaking down thecontextual study of ENISA. In this aspect, practicing big data strategy would improve operationsinside the organization. Then again, the utilization of big data in the organization hasdistinguished the issues and additionally dangers of security for the undertaking. Consequently,examination of dangers of big data technique for ENISA would depict agents of threats.1. Scenario of Big Data security infrastructureThe enterprise had deployed big data analytics keeping in mind the end goal to createcompelling operations and development of the organization. ENISA deployed big data strategyinside the enterprise with a specific end goal to increase competitive advantage (Patil &
Risk Analysis and Security | ENISA Case Study_3
3RISK ANALYSIS AND SECURITY: ENISA CASE STUDYSeshadri, 2014). In this viewpoint, risk and threat management should be effectively implied forcreating powerful development of operations. Big data threats would bring about advancement ofincidental threats for ENISA in incorporating the framework inside the organization. Theundertaking is considered as one of the efficient system for security, which is proficientobserving the particular stream of the operations inside the endeavor and additionally suggestproductive security framework inside the enterprise (Sagiroglu & Sinanc, 2013). In any case,protection in huge information is considered as central point assuming a pivotal part inimplantation of advancement show for ENISA. In this viewpoint, operations of the undertakingwould be profoundly upgraded through use of enormous information procedure inside theassociation. In addition, ENSIA had implied ICT based solutions enhancing security works with aspecific end goal to oversee enormous information procedure in the project. Thuraisingham(2015) stated that various proprietors are giving different models to the change of the ICTdevices in the enterprise including information proprietors, information transformers as well ascomputation. These models help in giving compelling management if the data is not secured inthe organization (Vatsalan et al. 2017). There are different practices that are analytics in theenterprise for overseeing risk and management of information utilized the association. Theprocedure of operating in the organizations suggested in the risk management for procuring thesecurity of data and information in the organization. Therefore, the advancement of the riskmanagement evaluation helps in keeping up the security of the information and data in theassociation.
Risk Analysis and Security | ENISA Case Study_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ENISA Case Study | Risk Analysis and Security Report
|17
|3802
|351

Risk Analysis and Security: ENISA Case Study
|17
|4120
|61

ITC596 - IT Risk Management - Report
|17
|4057
|40

Risk Analysis and Security- ENISA Case Study
|15
|3776
|213

Big Data Threat Landscape of Europe- Assignment
|15
|3480
|152

IT Risk Management - Case Study - ITC596
|11
|3284
|69