Trusted by 2+ million users, 1000+ happy students everyday
Showing pages 1 to 4 of 16 pages
Running head: RISK MANAGEMENT Risk Management Name of the Student Name of the University Author’s Note
RISK MANAGEMENT Table of Contents Introduction..........................................................................................................................2 1. Overview and ENISA big data Infrastructure.................................................................2 1.1 Overview....................................................................................................................2 2. Top Threats in Enisa and their significance....................................................................5 2.1. Most significant Threat.............................................................................................7 3. Threat agents, impact and threat probability...................................................................7 3.1. Threat Agent: Corporation........................................................................................8 3.2. Threat Agent: Cyber criminals.................................................................................8 3.3. Threat Agent: Cyber terrorists..................................................................................8 3.4. Threat Agent: Script kiddies.....................................................................................8 3.5. Threat Agent: Hacktivists or online social hackers..................................................9 3.6. Threat Agent: Employees.........................................................................................9 3.7. Threat Agent: Nation States......................................................................................9 3.8. Minimization of the Impact of the Threat.................................................................9 3.9. Threat Probability trends........................................................................................10 4. Improving ETL process.................................................................................................10 5. Current State of IT security...........................................................................................11 Conclusion.........................................................................................................................12 References..........................................................................................................................13
RISK MANAGEMENT Introduction Big data refers to the voluminous amount of data that can be mined, examined and utilized for business purposes. The big data can be structured, semi structured and unstructured. Big data can be utilized to analyze the different pattern and structure of data, which can be utilized to understand the trends in data and human behavior (Wu et al., 2014). The big data generally remains accessible to public and therefore, different security issues arise in the accessing and using the data. These threats are to be removed from the system in order to protect the system from attackers. The report elaborates the security issues faced by Enisa, the threat infrastructure, different types of threats and key threat agent (Inukollu, Arsi & Ravuri, 2014). The impact of the threat and ETL process is elaborated in the following paragraphs. 1. Overview and ENISA big data Infrastructure 1.1 Overview The case study discusses the different threats associated with big data, mainly with the replication of big data storage and the frequency of outsourcing the data. This leads to the development of new types of data breaches, leakage and degradation threat specific to big data. ENISA is facing a significant security and privacy issue that reflects on the performance level of the organization. The case study presents and discusses different big data threats and the lack of countermeasures to eliminate those threats into the system (Wright & De Hert, 2012). The major
RISK MANAGEMENT problem lies in the defective security system of the organization that is essential for securing the data. ENISA elaborates the different threats associated with the big data and the different part of the society affected by it. The insecure system of big data is reason fro increasing cyber attacks and therefore should be eliminated. Powerful approaches should be undertaken in order to fight the threats associated with big data. The case study further elaborates the concepts of threat landscape by comparing the threats associated with big data. It focuses on the threats, assets and the importance of the widely used data systems. The case study is of increasing use for developing a detailed risk management plan for ensuring security in big data. The big data architecture discussed in thiscase study is complex and therefore, this high level conceptual model requires increasing security requirements ( ENISA 2017). The architecture of big data systemsincludesdifferentdatasources,integrationprocesses,datastorageanddifferent computing models. These layers have varied function and the work in sync. Cloud computing can be deployed as an infrastructure layer to meet the requirements of effective storage of big data, which includes cost effectiveness, elasticity and ability of scaling (Gonzalez et al., 2012). However, the storage of data in cloud has different security issues that are discussed in the case study.
Found this document preview useful?
You are reading a preview Upload your documents to download or Become a Desklib member to get accesss