Ask a question from expert

Ask now

Risk Management | Enisa Case Study

16 Pages3811 Words262 Views
   

Added on  2019-10-30

Risk Management | Enisa Case Study

   Added on 2019-10-30

BookmarkShareRelated Documents
Running head: RISK MANAGEMENT: ENISA CASE STUDYRisk Management: ENISA Case StudyName of the StudentName of the UniversityAuthor’s note
Risk Management | Enisa Case Study_1
1RISK MANAGEMENT: ENISA CASE STUDYTable of ContentsIntroduction......................................................................................................................................21. Brief overview of the case study and diagram of ENISA big data security infrastructure.........21.1 Brief overview of the case study...............................................................................................21.2 Big data infrastructure diagram for ENISA...............................................................................42. Significant threats among the top threats.....................................................................................53. Identification and discussion on key threats agents and ways for minimizing their impact onthe system......................................................................................................................................103.1 Discussion of key threat agents...............................................................................................103.2Impact minimization.................................................................................................................113.3 Trend of Threat Probability.....................................................................................................124. ETL Process Improvement........................................................................................................125. IT Security of ENISA...............................................................................................................12Conclusion.....................................................................................................................................13References......................................................................................................................................14
Risk Management | Enisa Case Study_2
2RISK MANAGEMENT: ENISA CASE STUDYIntroductionIn this era of technology, risk analysis has become an essential factor for everyorganization. It helps to develop a well secured functional and operational system in theorganization. In order to develop a successful project it must be incorporated with riskassessment and management properties so that there is proper informational flow in theorganization (Baumer, 2017). Big data can be defined as an integration of technology, algorithmsand software for the purpose of collecting huge data volume. It focuses on analyzing the data tofind out hidden patterns and other information (Mahajan, Gaba & Chauhan, 2016). Theapplication of big data has gained huge importance over time. ENISA is the centre ofinformation security in network. It develops communities across various borders.This report gives an explanation about the various threats of big data. It also figures outthe most significant threat among the rest. This report also talks about the key threat agents inENISA (Kao et al. 2014). It gives an explanation about how can the process of ETL beimproved. At the end it says whether the ENISA is satisfied with its security system or not. Thisreport also identifies strategies that can be implemented in order to overcome or mitigate thethreats. Efficient organizations need the risk assessment policy to be strong in order to getsuccess.
Risk Management | Enisa Case Study_3
3RISK MANAGEMENT: ENISA CASE STUDY1. Brief overview of the case study and diagram of ENISA big data securityinfrastructure1.1 Brief overview of the case studyENISA is the European Union Agency for the Network and Information System. ENISAis the centre of information security in network. It develops communities across various borders.ENISA works with different groups for the purpose of developing advice in the area of securityof data and information (Enisa.europa.eu 2017). This organization gives assistance to theEuropean Union and the states that are its members. Big data has a list of valuable assets that canbe affected by security threats. Data and metadata are the most important threats in big data.Other assets are volatile, structured, streaming and semi structured data. Software and hardwareare also under the category of assets. There is storage as well as computing infrastructuralmodels. Privacy and security techniques are also present. Infrastructural security is the very firstaspect of the ecosystem security of big data. It mainly deals with secured distributed systems andsecured data storage (Vatsalan et al.,2017). The case study was based on a three step researchprocess. Here the initial step was to collect data and then assessment as well as gap analysis wascarried out. The last step was to define what good practices stand for. The architecture orinfrastructure of big data is classified or divided into five main layers like data sources, datastorage, integration process, analytics as well as presentation. The data sources consists of alltypes of data like streaming, semi structured and structured data. The process of integrationconsists of ETL, API and messaging. Data storage consists of RDF stores and file system that aredistributed. Analytics layer includes advanced and stream analytics. The presentation layer on
Risk Management | Enisa Case Study_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risk Analysis and Security- ENISA Case Study
|15
|3776
|213

European Union Agency for Network and Information Security - PDF
|12
|3085
|203

(Solved) ENISA Case Study docx.
|15
|3288
|124

IT Risk Management - Case Study - ITC596
|11
|3284
|69

BUSI 414 - IT Risk Management Case Study
|11
|3238
|47

Case study on Risk Management of Big Data
|15
|3274
|170