logo

Cybersecurity Risks and Cloud Computing

   

Added on  2020-02-18

16 Pages3661 Words205 Views
 | 
 | 
 | 
Running head: RISK MANAGEMENT
Risk Management
Name of the Student
Name of the University
Author’s Note
Cybersecurity Risks and Cloud Computing_1

RISK MANAGEMENT
Table of Contents
Introduction..........................................................................................................................2
1. Overview and ENISA big data Infrastructure.................................................................2
1.1 Overview....................................................................................................................2
2. Top Threats in Enisa and their significance....................................................................5
2.1. Most significant Threat.............................................................................................7
3. Threat agents, impact and threat probability...................................................................7
3.1. Threat Agent: Corporation........................................................................................8
3.2. Threat Agent: Cyber criminals.................................................................................8
3.3. Threat Agent: Cyber terrorists..................................................................................8
3.4. Threat Agent: Script kiddies.....................................................................................8
3.5. Threat Agent: Hacktivists or online social hackers..................................................9
3.6. Threat Agent: Employees.........................................................................................9
3.7. Threat Agent: Nation States......................................................................................9
3.8. Minimization of the Impact of the Threat.................................................................9
3.9. Threat Probability trends........................................................................................10
4. Improving ETL process.................................................................................................10
5. Current State of IT security...........................................................................................11
Conclusion.........................................................................................................................12
References..........................................................................................................................13
Cybersecurity Risks and Cloud Computing_2

RISK MANAGEMENT
Introduction
Big data refers to the voluminous amount of data that can be mined, examined and
utilized for business purposes. The big data can be structured, semi structured and unstructured.
Big data can be utilized to analyze the different pattern and structure of data, which can be
utilized to understand the trends in data and human behavior (Wu et al., 2014). The big data
generally remains accessible to public and therefore, different security issues arise in the
accessing and using the data. These threats are to be removed from the system in order to protect
the system from attackers. The report elaborates the security issues faced by Enisa, the threat
infrastructure, different types of threats and key threat agent (Inukollu, Arsi & Ravuri, 2014).
The impact of the threat and ETL process is elaborated in the following paragraphs.
1. Overview and ENISA big data Infrastructure
1.1 Overview
The case study discusses the different threats associated with big data, mainly with the
replication of big data storage and the frequency of outsourcing the data. This leads to the
development of new types of data breaches, leakage and degradation threat specific to big data.
ENISA is facing a significant security and privacy issue that reflects on the performance level of
the organization. The case study presents and discusses different big data threats and the lack of
countermeasures to eliminate those threats into the system (Wright & De Hert, 2012). The major
Cybersecurity Risks and Cloud Computing_3

RISK MANAGEMENT
problem lies in the defective security system of the organization that is essential for securing the
data. ENISA elaborates the different threats associated with the big data and the different part of
the society affected by it. The insecure system of big data is reason fro increasing cyber attacks
and therefore should be eliminated. Powerful approaches should be undertaken in order to fight
the threats associated with big data. The case study further elaborates the concepts of threat
landscape by comparing the threats associated with big data. It focuses on the threats, assets and
the importance of the widely used data systems. The case study is of increasing use for
developing a detailed risk management plan for ensuring security in big data. The big data
architecture discussed in this case study is complex and therefore, this high level conceptual
model requires increasing security requirements ( ENISA 2017). The architecture of big data
systems includes different data sources, integration processes, data storage and different
computing models. These layers have varied function and the work in sync. Cloud computing
can be deployed as an infrastructure layer to meet the requirements of effective storage of big
data, which includes cost effectiveness, elasticity and ability of scaling (Gonzalez et al., 2012).
However, the storage of data in cloud has different security issues that are discussed in the case
study.
Cybersecurity Risks and Cloud Computing_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents