logo

Top Threats in ENISA: Cybersecurity Risks and Mitigation Strategies

   

Added on  2019-10-30

16 Pages3811 Words262 Views
 | 
 | 
 | 
Running head: RISK MANAGEMENT: ENISA CASE STUDYRisk Management: ENISA Case StudyName of the StudentName of the UniversityAuthor’s note
Top Threats in ENISA: Cybersecurity Risks and Mitigation Strategies_1

1RISK MANAGEMENT: ENISA CASE STUDYTable of ContentsIntroduction......................................................................................................................................21. Brief overview of the case study and diagram of ENISA big data security infrastructure.........21.1 Brief overview of the case study...............................................................................................21.2 Big data infrastructure diagram for ENISA...............................................................................42. Significant threats among the top threats.....................................................................................53. Identification and discussion on key threats agents and ways for minimizing their impact onthe system......................................................................................................................................103.1 Discussion of key threat agents...............................................................................................103.2Impact minimization.................................................................................................................113.3 Trend of Threat Probability.....................................................................................................124. ETL Process Improvement........................................................................................................125. IT Security of ENISA...............................................................................................................12Conclusion.....................................................................................................................................13References......................................................................................................................................14
Top Threats in ENISA: Cybersecurity Risks and Mitigation Strategies_2

2RISK MANAGEMENT: ENISA CASE STUDYIntroductionIn this era of technology, risk analysis has become an essential factor for everyorganization. It helps to develop a well secured functional and operational system in theorganization. In order to develop a successful project it must be incorporated with riskassessment and management properties so that there is proper informational flow in theorganization (Baumer, 2017). Big data can be defined as an integration of technology, algorithmsand software for the purpose of collecting huge data volume. It focuses on analyzing the data tofind out hidden patterns and other information (Mahajan, Gaba & Chauhan, 2016). Theapplication of big data has gained huge importance over time. ENISA is the centre ofinformation security in network. It develops communities across various borders.This report gives an explanation about the various threats of big data. It also figures outthe most significant threat among the rest. This report also talks about the key threat agents inENISA (Kao et al. 2014). It gives an explanation about how can the process of ETL beimproved. At the end it says whether the ENISA is satisfied with its security system or not. Thisreport also identifies strategies that can be implemented in order to overcome or mitigate thethreats. Efficient organizations need the risk assessment policy to be strong in order to getsuccess.
Top Threats in ENISA: Cybersecurity Risks and Mitigation Strategies_3

3RISK MANAGEMENT: ENISA CASE STUDY1. Brief overview of the case study and diagram of ENISA big data securityinfrastructure1.1 Brief overview of the case studyENISA is the European Union Agency for the Network and Information System. ENISAis the centre of information security in network. It develops communities across various borders.ENISA works with different groups for the purpose of developing advice in the area of securityof data and information (Enisa.europa.eu 2017). This organization gives assistance to theEuropean Union and the states that are its members. Big data has a list of valuable assets that canbe affected by security threats. Data and metadata are the most important threats in big data.Other assets are volatile, structured, streaming and semi structured data. Software and hardwareare also under the category of assets. There is storage as well as computing infrastructuralmodels. Privacy and security techniques are also present. Infrastructural security is the very firstaspect of the ecosystem security of big data. It mainly deals with secured distributed systems andsecured data storage (Vatsalan et al.,2017). The case study was based on a three step researchprocess. Here the initial step was to collect data and then assessment as well as gap analysis wascarried out. The last step was to define what good practices stand for. The architecture orinfrastructure of big data is classified or divided into five main layers like data sources, datastorage, integration process, analytics as well as presentation. The data sources consists of alltypes of data like streaming, semi structured and structured data. The process of integrationconsists of ETL, API and messaging. Data storage consists of RDF stores and file system that aredistributed. Analytics layer includes advanced and stream analytics. The presentation layer on
Top Threats in ENISA: Cybersecurity Risks and Mitigation Strategies_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents