logo

Study Of ENISA Big Data Threat Landscape

   

Added on  2020-02-24

16 Pages3168 Words61 Views
ENISIA Big Data threat Land Scape1

Table of ContentsOverview of the study................................................................................................................2Top threats which have a high damaging effect in ENISA’s Big Data infrastructure...............4Key threat agents identified by ENISA in Cyber space.............................................................6Best practices to get rid of threat................................................................................................9Should ENISA be satisfied with current state of IT security?.................................................11Conclusion................................................................................................................................13References................................................................................................................................142

Overview of the studyThe main purpose of this study is to identify the key security challenges, which thecompanies are facing while implementing Analytics application to infrastructures. How thesetwo are mitigated with each other. This data focuses mostly on the data security of the privateorganizations it may be in the sectors of (Telecom, Energy, and Finance). However, moreorganizations like public organizations, government agencies, and research centres areconsidered as well. The main objective of ENISA is data security. They have formulatedcertain strategic plan to stop the Data theft and misuse. There has been a significant threat inBig Data. Here Big Data means a bunch of information which has a significant effect onvarious aspects of society it ranges from food security, climate, and health, resourceefficiency to energy, smart cities and intelligent transport system. As per the consideration ofEuropean Commission, they have acknowledged the fact of the impact of the data driveneconomy in the years to come. This is only possible by figuring out the strategic plan of bigdata. As per the estimation, only the EU citizen can contribute to the data driventechnology worth €1 trillion annually by 2020”. Thus it can be easily proven that data plays avery significant role in determining the economic strength of a country. Another mostimportant and vital reasons for protecting Big data is that it can be used for fighting terrorism,and many other important military applications. In understanding the battle field situation andother military aspects this data is of great use. So proper planning for protecting this data is ofhigh importance (Shao and Zhao, 2010). As per the current statistical data, Facebook isconsidered to hold 300 Petabytes of both unstructured and structured data. Twitter hascurrently decided to tap its own raw data using big data analytics. In the year of 2007 worldstelecommunication system has to make usage of 65 Exabyte without any scope of declining. Thus, with the increasing trend in technology and data advancement, there is anurgent requirement to store this Big Data in a secured and safe manner. These are the keypoints which have been highlighted in this report of ENISA. ScopeThis report considers the threat land scape for big data. This report gives an idea about theEmerging and probable threat possibilities for Big data technologies through various3

illustrations and definitions (Lee and Kang, 2015). The main focus is to protect the assets,from various threats and to implement prominent controlling measures to safe guard the BigData systems in the world.Target audience:- This report is basically helpful for big data operators and data providers as they can use thisinformation for their Risk assessment and Risk management analysis as per their specificneeds while drafting SLAs for their Big Data consumers. To prevent the Cyber threat analysisusing RA/ RM technique, this report can prove to be very useful and authenticated source fortheir detailed analysis to cope up with big data security issue.Figure 1: ENISA Big Data Infrastructure diagram Source: (Everett, 2015)4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risk Management Case Study - Threats Associated With ENISA
|16
|3355
|48

IT Risk Management | ENISA Case Study
|14
|3571
|182

Big Data Security Infrastructure
|15
|3063
|81

Case study on Risk Management of Big Data
|15
|3274
|170

(Solved) ENISA Case Study docx.
|15
|3288
|124

ENISA Big data Security Infrastructure | Report
|15
|3258
|221