Ask a question from expert

Ask now

Top Threats in Enisa Big Data Infrastructure

16 Pages3661 Words205 Views
   

Added on  2020-02-18

About This Document

Big data can be utilized to analyze the different pattern and structure of data, which can be utilized to understand the trends in data and human behavior (Gonzalez et al., 2014). The report elaborates the security issues faced by Enisa, the threat infrastructure, different types of threats and key threat agent (Inukollu, Arsi & Ravuri, 2014). Overview and ENISA big data Infrastructure 1.1 Overview The case study discusses the different threats associated with big data, mainly with the replication of

Top Threats in Enisa Big Data Infrastructure

   Added on 2020-02-18

BookmarkShareRelated Documents
Running head: RISK MANAGEMENT
Risk Management
Name of the Student
Name of the University
Author’s Note
Top Threats in Enisa Big Data Infrastructure_1
RISK MANAGEMENT
Table of Contents
Introduction..........................................................................................................................2
1. Overview and ENISA big data Infrastructure.................................................................2
1.1 Overview....................................................................................................................2
2. Top Threats in Enisa and their significance....................................................................5
2.1. Most significant Threat.............................................................................................7
3. Threat agents, impact and threat probability...................................................................7
3.1. Threat Agent: Corporation........................................................................................8
3.2. Threat Agent: Cyber criminals.................................................................................8
3.3. Threat Agent: Cyber terrorists..................................................................................8
3.4. Threat Agent: Script kiddies.....................................................................................8
3.5. Threat Agent: Hacktivists or online social hackers..................................................9
3.6. Threat Agent: Employees.........................................................................................9
3.7. Threat Agent: Nation States......................................................................................9
3.8. Minimization of the Impact of the Threat.................................................................9
3.9. Threat Probability trends........................................................................................10
4. Improving ETL process.................................................................................................10
5. Current State of IT security...........................................................................................11
Conclusion.........................................................................................................................12
References..........................................................................................................................13
Top Threats in Enisa Big Data Infrastructure_2
RISK MANAGEMENT
Introduction
Big data refers to the voluminous amount of data that can be mined, examined and
utilized for business purposes. The big data can be structured, semi structured and unstructured.
Big data can be utilized to analyze the different pattern and structure of data, which can be
utilized to understand the trends in data and human behavior (Wu et al., 2014). The big data
generally remains accessible to public and therefore, different security issues arise in the
accessing and using the data. These threats are to be removed from the system in order to protect
the system from attackers. The report elaborates the security issues faced by Enisa, the threat
infrastructure, different types of threats and key threat agent (Inukollu, Arsi & Ravuri, 2014).
The impact of the threat and ETL process is elaborated in the following paragraphs.
1. Overview and ENISA big data Infrastructure
1.1 Overview
The case study discusses the different threats associated with big data, mainly with the
replication of big data storage and the frequency of outsourcing the data. This leads to the
development of new types of data breaches, leakage and degradation threat specific to big data.
ENISA is facing a significant security and privacy issue that reflects on the performance level of
the organization. The case study presents and discusses different big data threats and the lack of
countermeasures to eliminate those threats into the system (Wright & De Hert, 2012). The major
Top Threats in Enisa Big Data Infrastructure_3
RISK MANAGEMENT
problem lies in the defective security system of the organization that is essential for securing the
data. ENISA elaborates the different threats associated with the big data and the different part of
the society affected by it. The insecure system of big data is reason fro increasing cyber attacks
and therefore should be eliminated. Powerful approaches should be undertaken in order to fight
the threats associated with big data. The case study further elaborates the concepts of threat
landscape by comparing the threats associated with big data. It focuses on the threats, assets and
the importance of the widely used data systems. The case study is of increasing use for
developing a detailed risk management plan for ensuring security in big data. The big data
architecture discussed in this case study is complex and therefore, this high level conceptual
model requires increasing security requirements ( ENISA 2017). The architecture of big data
systems includes different data sources, integration processes, data storage and different
computing models. These layers have varied function and the work in sync. Cloud computing
can be deployed as an infrastructure layer to meet the requirements of effective storage of big
data, which includes cost effectiveness, elasticity and ability of scaling (Gonzalez et al., 2012).
However, the storage of data in cloud has different security issues that are discussed in the case
study.
Top Threats in Enisa Big Data Infrastructure_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risk Management Case Study - Threats Associated With ENISA
|16
|3355
|48

Big Data Security Infrastructure
|15
|3063
|81

IT Risk Management | ENISA Case Study
|14
|3571
|182

Impact of Threats on System | Report
|16
|3327
|50

European Union Agency for Network and Information Security - PDF
|12
|3085
|203

Risk Management | Enisa Case Study
|16
|3811
|262