Threat Model for IIL Location Intelligence | Report
4 Pages440 Words166 Views
Added on 2020-02-24
Threat Model for IIL Location Intelligence | Report
Added on 2020-02-24
BookmarkShareRelated Documents
Running head: THREAT MODELIIL LIPPA Project Threat ModelName of the StudentName of the UniversityAuthor’s Note
1THREAT MODEL1. Introduction The primary purpose of the report is to prepare a threat model for IIL LocationIntelligence for Policy Profile Assessment (LIPPA) Project. The threat model identifies majorthreats that have significance over the LIPPA project and RAP application utility (Miller &Ager, 2013). This model clearly relates identified threats along with specific security,performance, and cost consideration.2. Application of LIPPA Project: DescriptionRAP (Risk Analysis Project) application is the foremost and existing Risk Analysis andImpact Analytics service provider to IIL. RAP is hosted to virtual in-house platform in IIL Datacenter. This particular risk analytics solution is effective for defining singular platform withsupporting enormous amount of generated data from in-house and cloud platforms. 3. Threat Identification and DefinitionThe threat identification and definition is discussed as following: 1.Storage Threat: The storage requirement is primarily 10 TB and later it isestimated that 10 TB backup storage is required for extension of database (Olivo,Santin & Oliveira, 2013). Therefore, backup storage should be attached withexisting storage of database; otherwise chance of losing data exists.2.Security Threat: Big data should be implemented in this scenario, for cloudstorage security options. Henceforth, the threat exists under the circumstance of
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
IIL Location Intelligence for Policy Assessment (LIPPA) Projectlg...
|18
|3310
|313
Information System Project: Location Intelligence for Policy Profile Assessmentlg...
|14
|2968
|426
Location Intelligence for Policy Assessment (LIPPA) Projectlg...
|14
|2912
|55
Risk Assessment for Information Technology, Human Resource, and Network Infrastructurelg...