IT Risk Management Report: ENISA Big Data Security Analysis

Verified

Added on  2019/11/20

|18
|4070
|295
Report
AI Summary
This report provides a detailed analysis of IT risk management in the context of Big Data, focusing on the ENISA framework. It begins with an overview of Big Data, its sources, and the increasing risks associated with its use. The report then presents a layered architecture of a Big Data security system, followed by an examination of the top threats, with a focus on eavesdropping, interception, and hijacking. Key threat agents, including partnerships, cybercriminals, and employees, are identified and discussed, along with methods to minimize their impact. The report also explores trends in threat probability and suggests improvements to the ETL (Extract, Transform, Load) process to enhance data security. The conclusion emphasizes the importance of proactive measures to protect Big Data resources.
Document Page
Running Head: IT RISK MANAGEMENT
IT RISK MANAGEMENT
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1IT RISK MANAGEMENT
Table of Contents
Introduction................................................................................................................................2
Question 1..................................................................................................................................3
Question 2..................................................................................................................................5
Question 3..................................................................................................................................7
Question 4................................................................................................................................10
Question 5................................................................................................................................12
Conclusion................................................................................................................................14
References................................................................................................................................16
Document Page
2IT RISK MANAGEMENT
Introduction
Big Data often indicates the designated palette of algorithms, system employment and
technology that collects the data of unmatched values, variety and volume. This extraction is
done by massive amount of analytics that are advanced and has the ability to parallel
computation. The Big Data sources are diverse and are in large number. The multimedia
sensors are distributed over several aspects mobile telecommunication devices, IoT (Internet
of Things), business process distribution and other web-based applications. These are all
candidate data providers. With the increase of Big Data algorithms and technologies,
aregradually increasing the effectiveness in decision-making in complex communities and
organization. But the increase of benefits there are also increment of malicious technologies
that creates risks to the organization. ENISA discusses the above issue in this research paper
and explores the aspects of both the importance and risks related to Big Data.
Document Page
3IT RISK MANAGEMENT
Question 1
Provide a brief overview of the case study and prepare a diagram for the ENISA Big Data
security infrastructure.
For the situation investigation of ENISA, there is an elaboration on dangers that are
identified with Big Data. There has been highly picked up footing inside most recent couple
of years and consequently the information stockpiling and data innovation has been expected
to assume a genuine part on a few new viewpoints in the general public (Marinos, 2013). The
perspectives that must be create and influenced by the improvement of data innovation and
Big information are nourishment security, wellbeing security, atmosphere and assets that are
proficient to vitality, shrewd transport framework and savvy urban communities. The
potential effect of the Big Data has been recognized by the European Commission by
distinguishing the vital approach in the Big Data. The information is accordingly possible to
the financial drive in the authoritative framework. In the field of science and research there is
additionally a huge effect of the Big Data that keeps on raising. In this way, numerous offices
and foundation everywhere throughout the globe are wanting to dispatch the Big Data
ventures for better misuse of information examination and distributed computing. Innovations
of Big Data can likewise be utilized as a part of the use of military field, for example, battle
pleasing or battling virtual or genuine psychological warfare. Along these lines distinguishing
and gathering the data from heterogeneous sources from any genuine recorded or open
sources has an extraordinary effect (Marinos, Belmonte &Rekleitis, 2014). Cutting edge and
very novel ICT frameworks are utilized as a part of the approach of Big Data. Yet, increment
in the utilization of this Big Data innovation has likewise as often as possible expanded the
odds of digital assaults, information breaks and hacking. The increments of this sort of
difficulties are both slanting the number in complex and effect. By increment in the quantity
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4IT RISK MANAGEMENT
of ease of use of Big Data in business and associations, the aggressors get motivating forces
for creating and practices assaults against Big Data examination. This innovation has
additionally the capacity to be utilized as a device that battles the digital dangers by offering
security and protection experts that has important bits of knowledge in occurrence
administration and dangers. ENISA conveys the range of this Threats Landscapes in the field
of Big Data investigation, by the contributions from the ENISA Threat Landscape exercises.
The contextual analysis examines about the design, the benefit scientific classification of Big
Data, ENISA danger scientific classification the focused on group of onlookers of Big Data
approach, the procedure by which the contextual investigation has been done, holes of the
examination lastly prescribing the approach.
Distributed computing is portrayed as the foundation layer of Big Data framework in
ENISA. This may meet the framework prerequisite like the versatility, cost-adequacy and the
capacity to scale here and there (Marinos, Belmonte &Rekleitis, 2014). The security
framework of Big Data framework in ENISA takes after:
Data sources layer: This layer comprises of gushing information from the sensor,
unique information sources, and organized data like social database, semi-organized
and unstructured information.
Integration process layer: This layer just worries with vital information having pre-
preparing operation getting information thus incorporated the datasets into an
organized frame.
Data stockpiling layer: This information layer is comprising of substantial assortment
of assets like RDF stores, NoSQL, dispersed record framework and NewSQL
database, that are reasonable for extensive number of datasets that constant
stockpiling.
Document Page
5IT RISK MANAGEMENT
Analytics and figuring model layer: This layer typifies distinctive information
apparatuses like the MapReduce that keeps running over the assets that are put away,
including the programming model and information administration.
Presentation layer: This layer empowers the representation advances like web
programs, desktop, cell phones and web administrations.
Figure 1: Layered architecture of Big Data security system
(Source: By the author)
Question 2
Out of the ‘’Top threats’’ which threat would you regard to be the most significant and
why?
The various types of dangers as per the gathering are:
Document Page
6IT RISK MANAGEMENT
Risk Group: Eavesdropping, Interception and Hijacking
Sharing of information and spillage of data due the human mistake (Barnard-Wills,
2014)
Leaks of information by means of uses in Web (unsecure APIs)
Incorrect adjustment or insufficient arranging and plan
Interception of data
Risk Group: Nefarious Activity/Abuse
Identity extortion
Denial of administration
Malicious code/programming/movement
Generation and utilization of rebel declaration
Unauthorized exercises/Misuse of review instruments/Abuse of approvals
Business process disappointment (Lévy-Bencheton et al., 2015)
Risk Group: Legal
Breach of enactment/Abuse of individual information/Violation of laws or directions
Skill lack
Agreeing the examination of the three dangers bunches the most noteworthy risk is
the "Listening stealthily, Interception and Hijacking", since the most information and security
dangers are identified with this danger confronts greatest troubles, similar to the information
breaches, hacking, digital assault and some more. Influencing the most private and classified
assets of the organization (Cho et al., 2016). The principle assaults by this risk bunches are
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7IT RISK MANAGEMENT
Leakage of Information/sharing because of human blunder, Leaks of information by means of
Web applications (unsecure APIs), lacking outline and arranging or inaccurate adjustment
and Interception of data. The commitment of keen gadgets and PC stage from the
phenomenal systems administration to the Big Data may posture protection concern where a
person's area, exchange and other conduct are recorded carefully (Scott et al., 2016). This
danger specialist is antagonistic in nature. Their objective is essentially monetary benefit
having higher ability level. Cybercriminals can be sorted out on a neighborhood, national or
even worldwide level. These specialists are socially and politically inspired people utilizing
the system or the PC framework for challenging and advancing reasons for the harm (Wang,
Anokhin&Anderl, 2017). Prominent sites are for the most part being focused alongside
knowledge organizations and military establishments.
Question 3
Identify and discuss the key Threat Agents. What could be done to minimize their impact
on the system? Based on the data provided, discuss the trends in threat probability.
Agreeing the ENISA danger Landscape, the risk specialist is depicted as "somebody
or something with better than average capacities, a reasonable aim to show a risk and a record
of past exercises in such manner" (Barnard-Wills, Marinos&Portesi, 2014). The association
utilizing Big Data application must know about the dangers that are rising and from which
risk bunches that they have a place. There are classifications by which the danger operators
have been isolated in:
Partnerships: This classification alludes to the undertakings or associations that may draw in
or adjust any strategies that might be exploitative and hostile to the venture. These are the
threatening risk operators having the thought process to assemble upper hand over the
contenders. The association for the most part sorts their principle targets and centering over
Document Page
8IT RISK MANAGEMENT
the size and segments the undertakings have abilities to the region of essentialness, and from
the territory of innovative perspective to human building insight in the field of mastery
(Brender& Markov, 2013).
Digital Criminals: This risk operator is threatening in nature. Their objective is essentially
monetary profit having higher aptitude level (Le Bray, Mayer &Aubert, 2016).
Cybercriminals can be sorted out on a nearby, national or even worldwide level.
Digital psychological oppressors: The inspiration of this risk operator can either be religious
or political, that extends the movement taking part in digital assaults. The objectives that are
favored by the digital psychological oppressors are fundamentally finished basic framework
like in media transmission, vitality generation or open human services framework (Olesen,
2016). This perplexing framework is by and large picked since disappointment of this
association makes as mayhem and cause extreme effect in the legislature and society.
Content kiddies: These specialists utilize the contents and the projects created since these are
for the most part incompetent, that assaults the system or the PC frameworks and additionally
sites.
Online social programmers (hacktivists): These specialists are socially and politically
inspired people utilizing the system or the PC framework for dissenting and advancing
reasons for the harm (Bugeja, Jacobsson&Davidsson, 2017). Prominent sites are for the most
part being focused alongside insight organizations and military establishments.
Representatives: Sometime the workers for the disintegration of the organization get to the
organization's assets from inside and subsequently unfriendly and non-antagonistic specialists
both of these can considered to the representative. This operator incorporates staffs,
operational staffs, temporary workers or security watchmen of the organization (Belmonte
Document Page
9IT RISK MANAGEMENT
Martin et al., 2015). A lot of information is required for this sort of dangers, which causes
them in setting the viable assault against the advantages of the organization.
Country expresses: these operators for the most part have hostile abilities in digital security
and may utilize it over an endeavor.
Securing the Big Data resources by utilizing pertinent strategies and procedures in the
association. There has been a mutual duty regarding the protection, security and framework
administration of each association. Since, the specialists focus on the fundamental partners of
the Big Data concentrating on the substantial measure of datasets (Belmonte Martin et al.,
2015). After a watchful development of the life cycle of Big Data there ought to be point of
checking and demonstrating the right conduct. There can be achievement in merchants
submitted by the outsider, applying safety efforts and consequently stay refreshed and
centered.
On the premise of the information gave the pattern in the risk likelihood it has been
clarified that:
a) The most data spillage, arranging or despicably adjustment, Inadequate outline and,
Identity extortion, Malicious code, Misuse of review instruments, Failures of business
process, Breach of enactment or Abuse of individual information has been
undermined by the workers (Rhee et al., 2013).
b) Cyber crooks, companies and digital fear mongers for the most part influences the
Leaks of information by means of Web applications having unsecure APIs,
Interception of data, Identity misrepresentation, DOI (Denial of administration),
Malicious code approval and utilization of rebel testaments.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10IT RISK MANAGEMENT
c) The slightest harmed has been finished by the content kiddies as there are
incompetent specialists.
Question 4
How could the ETL process be improved? Discuss.
The dangers scientific categorization as created by the ENISA Threat Landscape
(ETL) Group and this incorporates dangers that are pertinent for the advantages of the Big
Data and these can be enhances by the accompanying ways:
Tackling Bottlenecks: Making without question you log estimations, for instance,
time, number of records arranged and utilization of hardware. Checking what number
of advantages each bit of the methodology takes and address the heaviest one.
Building facts and estimations in the orchestrating condition. Wherever your
bottleneck may be, take a full breath and hop into the code. The power is most likely
going to be with the customers endorsed (Rhee et al., 2013).
Load Data Incrementally: Changes stacked within the old and new data that spares
highly deals of the present time, whereas these are been organized with total loads. It
is much difficult to execute and hence hold on to the routine, not depending on the
inconvenience. Thus the incremented stacking can execute the ETL enhancement.
Partition substantial tables: The use of extensive social database that may enhance the
information handling windows can be parceled in huge tables. Means chop enormous
tables that are physically smaller mainly by the date of execution. Each parcel has its
own records and the files tree is shallower subsequently taking into account snappier
access to the information. It likewise helps in exchanging the data within a table
snappy Meta information operation rather than real addition or erasure of data
records.
Document Page
11IT RISK MANAGEMENT
Cut out incidental information: The gathering of information however much as could
reasonably be expected is imperative, might be not every one of the information but
rather it is exclusive commendable to enter the data centre distribution. For an
example: BI investigators futile by the furniture model’s picture. The only thing that
needs to be changed in the enhancement of the ETL execution, taking a seat and
nature precisely that the information must be prepared and left unessential
segments/lines out. It is a good plan to begin small and develop with the growth rather
than making a unreasonable plan that may take ages to get execute.
Cache the information: It is feasible for the reserve information to accelerate
significantly since get to memory performs faster than the hard drives. It is to be noted
that storing is constrained by the most outrageous measure of memory your gear
support, so it is hard to fit all the plastics data.
Process in parallel: Other than serial preparing, improvement of assets is imperative
by parallel adjustment the whole time. These procedures can scale up by redesigning
the CPU, yet just up to a constrained part. There can be better arrangements also.
Use Hadoop: Apache Hadoop programming is an open source library including
programming administration that permits the dispersion procedure of substantial
arrangements of information over the bunches of PCs by utilizing straightforward
program models. It has been intended to scale up from one-to-different machines that
is, from single server to numerous different servers or machines, which offers
neighborhood stockpiling and calculation.
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]