Comprehensive Report on ENISA Big Data Security and Threats
VerifiedAdded on 2019/11/20
|13
|3369
|187
Report
AI Summary
This report provides an overview of the ENISA Big Data security infrastructure, examining how various business and technology providers handle data. It discusses anonymization techniques, granular access control, and policy enforcement. The report identifies web-based attacks as a significant threat, highlighting the risks associated with confidentiality, availability, and integrity. It also analyzes key threat agents like cybercriminals and script kiddies, proposing measures to minimize their impact, such as improved password security and two-factor authentication. The report evaluates the ETL process, suggesting improvements through optimization and leveraging open-source tools. Finally, it concludes that ENISA is not entirely satisfied with its current IT security state, emphasizing the need for continuous improvement and proactive measures to address evolving cyber threats.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

report
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Contents
1.......................................................................................................................................................2
2.......................................................................................................................................................3
3.......................................................................................................................................................4
4.......................................................................................................................................................6
5.......................................................................................................................................................8
References......................................................................................................................................10
1.......................................................................................................................................................2
2.......................................................................................................................................................3
3.......................................................................................................................................................4
4.......................................................................................................................................................6
5.......................................................................................................................................................8
References......................................................................................................................................10

1.
1) Provide a brief overview of the case study and prepare a diagram for the ENISA Big
Data security infrastructure.
The data security infrastructure of ENISA is based on how the different business players and the
technology providers work on handling and creating the different new products. The extensive
designing collection and the processing of the information is based on how the big data analytics
work over the privacy concerns with the wide range of the electronic surveillance, profiling and
the other disclosures that are done for any of the private data. The benefits of the analytics re
based on working over the limits to process and integrate the system. It includes the approaches
with taking the different positions that relate to the challenges of the technology for the big data
and the opportunities for the same. This will help in enhancing the technologies with the current
and the future big data requirements. The anonymization is based on working over the privacy
preserving computations, granular accessing control mechanisms, and the policy enforcement
patterns. The computation and the accountability is to handle the provenance that is set for the
user empowerment and the control. (Jerome, 2013).ENISA works on the three cases related to
the systems where there is a use of the advancement in the Security Incident Event Management
(SIEM), Big data for the Industrial control systems and in the telecoms. The focus has been on
the privacy concerns which relate to the wide scale electronic surveillance, profiling and the
disclosure of the private data. The benefits are based on the cost of privacy where the time and
technology does not stop. The focus is also on crafting the right balance mainly to make use of
the defined privacy by designed strategies. ENISA works on the defined patterns with the
privacy and data protection with defined benefits that allow the analytics without any
compromise in the personal protection of the data. The technologies are based on the setup with
1) Provide a brief overview of the case study and prepare a diagram for the ENISA Big
Data security infrastructure.
The data security infrastructure of ENISA is based on how the different business players and the
technology providers work on handling and creating the different new products. The extensive
designing collection and the processing of the information is based on how the big data analytics
work over the privacy concerns with the wide range of the electronic surveillance, profiling and
the other disclosures that are done for any of the private data. The benefits of the analytics re
based on working over the limits to process and integrate the system. It includes the approaches
with taking the different positions that relate to the challenges of the technology for the big data
and the opportunities for the same. This will help in enhancing the technologies with the current
and the future big data requirements. The anonymization is based on working over the privacy
preserving computations, granular accessing control mechanisms, and the policy enforcement
patterns. The computation and the accountability is to handle the provenance that is set for the
user empowerment and the control. (Jerome, 2013).ENISA works on the three cases related to
the systems where there is a use of the advancement in the Security Incident Event Management
(SIEM), Big data for the Industrial control systems and in the telecoms. The focus has been on
the privacy concerns which relate to the wide scale electronic surveillance, profiling and the
disclosure of the private data. The benefits are based on the cost of privacy where the time and
technology does not stop. The focus is also on crafting the right balance mainly to make use of
the defined privacy by designed strategies. ENISA works on the defined patterns with the
privacy and data protection with defined benefits that allow the analytics without any
compromise in the personal protection of the data. The technologies are based on the setup with

the control mechanisms with the policy enforcement and accountability. The transparency and
the accessing of the tools are for the big data. It is mainly based on the user empowerment. The
big data is mainly to handle the standards of the sensors for the Internet of Things and how the
mobile telecommunication devices and the network processes are set for the web based
applications. (Payton et al., 2014)
2.
the accessing of the tools are for the big data. It is mainly based on the user empowerment. The
big data is mainly to handle the standards of the sensors for the Internet of Things and how the
mobile telecommunication devices and the network processes are set for the web based
applications. (Payton et al., 2014)
2.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

2) Out of the ‘’Top threats’’ which threat would you regard to be the most significant and
why?
The web based attacks are considered to be one of the top damages to any organisation which
leads to the greatest risks with the risks that are associated to the confidentiality, availability and
the integrity. The major focus of these threats is based on the penetration testing. They mainly
handle the hosting to target the attack and the applications as well as the means for the malicious
end users. The vulnerabilities could also lead to the breach of the system protection mechanism
with the major advantage or the gain o access to the different private information or the resources
of the system. The information is gathered and included in the social security numbers (SSN).
They are for the identification of theft. The other target for the attackers is the credit card data
which is found to be left unprotected and unencrypted. The issues also include the web attacks
where the programmers take the major benefits in the program helplessness with the unsafe
capacity of the fact to download any type of the vindictive substance. The online click jacking is
the malignant routine to control the site for the particular client action where the performance of
the activities is found to be completely unconscious. (Perera et al., 2015) The organisations need
to work on maintaining the web presence which is generally at risks of being hacked and
attacked. The levels are measured for the organisation where the different factors are related to
the intellectual or the personal identification of the information which is stored in the
organisation (Pattabiraman et al., 2018). The product of the intellect is having the commercial
value with the copyrighted property like the liberty or the artistic works which are the patents or
the other business methods. ENISA need to focus on the vulnerability prevention with the
comprehensive application security with the developers. The software architecture is like the
building of the structures like the planning and setting the sights which adhere to the
why?
The web based attacks are considered to be one of the top damages to any organisation which
leads to the greatest risks with the risks that are associated to the confidentiality, availability and
the integrity. The major focus of these threats is based on the penetration testing. They mainly
handle the hosting to target the attack and the applications as well as the means for the malicious
end users. The vulnerabilities could also lead to the breach of the system protection mechanism
with the major advantage or the gain o access to the different private information or the resources
of the system. The information is gathered and included in the social security numbers (SSN).
They are for the identification of theft. The other target for the attackers is the credit card data
which is found to be left unprotected and unencrypted. The issues also include the web attacks
where the programmers take the major benefits in the program helplessness with the unsafe
capacity of the fact to download any type of the vindictive substance. The online click jacking is
the malignant routine to control the site for the particular client action where the performance of
the activities is found to be completely unconscious. (Perera et al., 2015) The organisations need
to work on maintaining the web presence which is generally at risks of being hacked and
attacked. The levels are measured for the organisation where the different factors are related to
the intellectual or the personal identification of the information which is stored in the
organisation (Pattabiraman et al., 2018). The product of the intellect is having the commercial
value with the copyrighted property like the liberty or the artistic works which are the patents or
the other business methods. ENISA need to focus on the vulnerability prevention with the
comprehensive application security with the developers. The software architecture is like the
building of the structures like the planning and setting the sights which adhere to the

fundamental software development. The software developers are able to carry the skills with
easy proofread and locating the vulnerabilities. (Van Dijck, 2014) All the organisation works on
keeping up the proximity standards with the risks that are being struck. The level of threat is
evaluated based on the affiliation standard, where there are different few variables to handle the
choice of the threat level with the insightful property that is set away by the affiliation. It is
important to handle the implantation on the site with the drive-by-downloads which takes the
major advantage of the different vulnerabilities of the browser to handle and download from the
full-fledged viruses. The encountering is mainly through the social engineering attacks which are
set to provide the code that automatically generates the fingerprints for the browser version. The
users also need to be educated about how the organisation antivirus need to be kept updated with
the different variations based on clickjacking which can easily trick the users into clicking on the
pages which contain some invisible links (Pahi et al., 2016).
3.
3) Identify and discuss the key Threat Agents. What could be done to minimize their
impact on the system? Based on the data provided, discuss the trends in threat probability.
There are different threats which are analysed depending upon the cyber terrorists, cyber
criminals and the script kiddies, with the online social hacking. The minimisation of the impact
on the system could be through creating a better password which can easily remove the issues of
the factor authentication. The two-factor authentication is based on how one can easily send the
code to the tab to enter into the account (Karlsson et al., 2017). The cybercrime also involves the
computer or the network which is used for the offences. The criminal motives are mainly to harm
easy proofread and locating the vulnerabilities. (Van Dijck, 2014) All the organisation works on
keeping up the proximity standards with the risks that are being struck. The level of threat is
evaluated based on the affiliation standard, where there are different few variables to handle the
choice of the threat level with the insightful property that is set away by the affiliation. It is
important to handle the implantation on the site with the drive-by-downloads which takes the
major advantage of the different vulnerabilities of the browser to handle and download from the
full-fledged viruses. The encountering is mainly through the social engineering attacks which are
set to provide the code that automatically generates the fingerprints for the browser version. The
users also need to be educated about how the organisation antivirus need to be kept updated with
the different variations based on clickjacking which can easily trick the users into clicking on the
pages which contain some invisible links (Pahi et al., 2016).
3.
3) Identify and discuss the key Threat Agents. What could be done to minimize their
impact on the system? Based on the data provided, discuss the trends in threat probability.
There are different threats which are analysed depending upon the cyber terrorists, cyber
criminals and the script kiddies, with the online social hacking. The minimisation of the impact
on the system could be through creating a better password which can easily remove the issues of
the factor authentication. The two-factor authentication is based on how one can easily send the
code to the tab to enter into the account (Karlsson et al., 2017). The cybercrime also involves the
computer or the network which is used for the offences. The criminal motives are mainly to harm

the reputation of the victim through the use of the modern telecommunication networks like the
emails, notice boards and the groups (Fhom, 2015). There are other issues related to the hacking
and the copyright infringement, unwarranted mass surveillance. The computer fraud also
includes the government officials and the information technology security that is documented
based on the significant increase of the internet problems and the severe scans. The methods
include the foreign intelligence services and the groups to handle the security holes in the critical
systems. The cyberterrorism is also the act which is for the use of cyberspace or the computer
resources.
The best counteractive action for the same is to clear the data with the security break up or the
web attack (Topping, 2017). Through this, there is a possibility to handle the security standards
with the training that would lead to the essential impacts at a particular generalised security. The
off-chance with the end-clients are defined about the dangers and to check on the different
activities which contribute towards the variable that strides to handle the events which are
suspicious. The odds and the security tends to progress with avoiding any of the personal data
through the emails and work on the awareness about phishing. Here, the web page also belongs
to the website of the company with the designing that is done mainly by the other person. The
threat agents, and the script kiddies are mainly to acknowledge the ideas related to the
programming but one can easily hack the script of the other person. Hence, in this way one can
easily hack the system while the other people hack just for fun (Michael & Michael, 2013).
ENISA works on the high-tech ICT systems where the cyber-attacks show the increased trend
with the number, sophistication and the impact. It includes the accuracy of the methods and
intelligence from the heterogenous sources which include the open sources and the battlefield
data (Baptista et al., 2016). The threat analysis and the emerging trends in the cyber security is
emails, notice boards and the groups (Fhom, 2015). There are other issues related to the hacking
and the copyright infringement, unwarranted mass surveillance. The computer fraud also
includes the government officials and the information technology security that is documented
based on the significant increase of the internet problems and the severe scans. The methods
include the foreign intelligence services and the groups to handle the security holes in the critical
systems. The cyberterrorism is also the act which is for the use of cyberspace or the computer
resources.
The best counteractive action for the same is to clear the data with the security break up or the
web attack (Topping, 2017). Through this, there is a possibility to handle the security standards
with the training that would lead to the essential impacts at a particular generalised security. The
off-chance with the end-clients are defined about the dangers and to check on the different
activities which contribute towards the variable that strides to handle the events which are
suspicious. The odds and the security tends to progress with avoiding any of the personal data
through the emails and work on the awareness about phishing. Here, the web page also belongs
to the website of the company with the designing that is done mainly by the other person. The
threat agents, and the script kiddies are mainly to acknowledge the ideas related to the
programming but one can easily hack the script of the other person. Hence, in this way one can
easily hack the system while the other people hack just for fun (Michael & Michael, 2013).
ENISA works on the high-tech ICT systems where the cyber-attacks show the increased trend
with the number, sophistication and the impact. It includes the accuracy of the methods and
intelligence from the heterogenous sources which include the open sources and the battlefield
data (Baptista et al., 2016). The threat analysis and the emerging trends in the cyber security is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

considered important for the EU where ENISA also focus on analysing the current and the
emerging risks that includes the statistical bodies with collection of other relevant information.
The scope is based on understanding the threats of the big data and working on providing a better
recommendation with important and emerging trends (BACIVAROV et al., 2017).
4.
4) How could the ETL process be improved? Discuss.
ETL could be improved through the provisions which include the analysis and the identification
of optimising the different options. This will make it easy for the analysis and focus on the
performance which applies to the improvement by the leverages on the synergies, use of the open
source approaches and tools with data. The objective is based on working over the improvement
of the different options which is for the ENISA threat analysis procedure. This includes the
procedures which are for handling the optimisation and the other improvement options which
could easily be adapted through the state of play in ENISA threat analysis process. The ETL
processes are for the proper development where there is an increased sophistication of the attacks
and the tools. The ENISA being the centre of the network and the setup is based on the
information security. It includes the assistance of the EU member states with the implementation
based on the improved resilience (Soria et al., 2016). The network improvement and the
information security is possible through the system of EU. ENISA is one of the centre of the
network which includes the improvement of the resilience of Europe critical information
infrastructure (Mohammad et al., 2017). ENISA works on the groups with the developing of the
advice and the information is based on the information security measures. It also includes the
enhancement of the expertise in the EU Member states with the support and development of the
emerging risks that includes the statistical bodies with collection of other relevant information.
The scope is based on understanding the threats of the big data and working on providing a better
recommendation with important and emerging trends (BACIVAROV et al., 2017).
4.
4) How could the ETL process be improved? Discuss.
ETL could be improved through the provisions which include the analysis and the identification
of optimising the different options. This will make it easy for the analysis and focus on the
performance which applies to the improvement by the leverages on the synergies, use of the open
source approaches and tools with data. The objective is based on working over the improvement
of the different options which is for the ENISA threat analysis procedure. This includes the
procedures which are for handling the optimisation and the other improvement options which
could easily be adapted through the state of play in ENISA threat analysis process. The ETL
processes are for the proper development where there is an increased sophistication of the attacks
and the tools. The ENISA being the centre of the network and the setup is based on the
information security. It includes the assistance of the EU member states with the implementation
based on the improved resilience (Soria et al., 2016). The network improvement and the
information security is possible through the system of EU. ENISA is one of the centre of the
network which includes the improvement of the resilience of Europe critical information
infrastructure (Mohammad et al., 2017). ENISA works on the groups with the developing of the
advice and the information is based on the information security measures. It also includes the
enhancement of the expertise in the EU Member states with the support and development of the

cross-border communities to improve the network and the information security standards. The
sharing of information is based on the internet organisations, security experts and the developers
of the security guides. There is a need to improve the physical attacks, disasters, failure or the
malfunctioning of the system. The damages, or the eavesdropping, interception is considered to
be some of the points to be focused on. Here, the trends are related to the increased concepts
other than the DNS threats. The recommendations are also for the internet infrastructure owners
and the electronic network regulatory agencies to evaluate the levels about how the applications
need to cooperate with the community. The exchange on the threats and the promotions are
based on mitigating the measures with the users for deploying a better and good practice
guideline. The agency contributes towards the secured cyber environment in the way by
recommendations and setting the policy development and implementation programs
(Jarmakiewicz et al., 2017). The ENISA ETL works on the overviewing of the threats and can
also be used for the operational communities to learn by doing through the different training and
the exercising (D’ Acquisto et al., 2015). The focus is on the cyber exercises where there is a
major focus on the information security and how it is possible to handle the management of the
large scale of the cyber incidents in the cross-border environment (Vidal et al., 2017).
5.
5) To sum up, should ENISA be satisfied with its current state of IT Security? Why? Or
Why not?
ENISA focus mainly on handling the security systems, where ENISA has not been able to get
entire satisfaction about the current state of the IT security. The use of the strong engineering
sharing of information is based on the internet organisations, security experts and the developers
of the security guides. There is a need to improve the physical attacks, disasters, failure or the
malfunctioning of the system. The damages, or the eavesdropping, interception is considered to
be some of the points to be focused on. Here, the trends are related to the increased concepts
other than the DNS threats. The recommendations are also for the internet infrastructure owners
and the electronic network regulatory agencies to evaluate the levels about how the applications
need to cooperate with the community. The exchange on the threats and the promotions are
based on mitigating the measures with the users for deploying a better and good practice
guideline. The agency contributes towards the secured cyber environment in the way by
recommendations and setting the policy development and implementation programs
(Jarmakiewicz et al., 2017). The ENISA ETL works on the overviewing of the threats and can
also be used for the operational communities to learn by doing through the different training and
the exercising (D’ Acquisto et al., 2015). The focus is on the cyber exercises where there is a
major focus on the information security and how it is possible to handle the management of the
large scale of the cyber incidents in the cross-border environment (Vidal et al., 2017).
5.
5) To sum up, should ENISA be satisfied with its current state of IT Security? Why? Or
Why not?
ENISA focus mainly on handling the security systems, where ENISA has not been able to get
entire satisfaction about the current state of the IT security. The use of the strong engineering

capabilities is based on developing the ranges of the different steps to avoid the different issues
related to security. The competitiveness is mainly with the attackers through the use of the cyber
security and the data protection. Hence, to overcome the issues, there is a need to make use of
the proper precautions (Jerome, 2013). There are different threats, with the sensitive information
based on the easy accessibility. This is mainly through the firewalls with the blocking in the
unauthorised access. ENISA includes the prompt of the opposition layer powers where the point
is about the assorted qualities which includes certain security suggestions (Polemi et al., 2017).
ENISA works on the data security area where the EU need to focus on guaranteeing about the
controls that have been for the different purposes and does not include or hurt the security
analyst or the firm (Woods et al., 2017). The standards are set for ENISA with the exhibition of
the exemplary performance that includes the challenges related to the combatting of the threat of
the hackers. With this, there are certain situations where ENISA should not be satisfied which
includes the management to succeed in breaching the security. They can focus on the current
state with the efforts put in to handle the activities that damage to their property or any loss of
the lives. Along with this, ENISA need to focus on countering the threats that do not need in
controlling. Here, the technology change and so the new methods lead to the breach of security
which could easily be incorporated over the time (Vidal et al., 2017). There are different risks
related to the alignment of the asset owners in the smart phone which needs to be administered
with the terms of connectivity and the embedded functionality. It is also important to focus on
the connectivity with the functionality that is based on the issues of privacy and the access, and
the copyrights. The converged media devices are set with playing all the forms that are due to the
multiple designing. It results in the security and the privacy peculiarities, sharing the issues and
working on the vulnerabilities. The practices involve the designing of the smart home of the
related to security. The competitiveness is mainly with the attackers through the use of the cyber
security and the data protection. Hence, to overcome the issues, there is a need to make use of
the proper precautions (Jerome, 2013). There are different threats, with the sensitive information
based on the easy accessibility. This is mainly through the firewalls with the blocking in the
unauthorised access. ENISA includes the prompt of the opposition layer powers where the point
is about the assorted qualities which includes certain security suggestions (Polemi et al., 2017).
ENISA works on the data security area where the EU need to focus on guaranteeing about the
controls that have been for the different purposes and does not include or hurt the security
analyst or the firm (Woods et al., 2017). The standards are set for ENISA with the exhibition of
the exemplary performance that includes the challenges related to the combatting of the threat of
the hackers. With this, there are certain situations where ENISA should not be satisfied which
includes the management to succeed in breaching the security. They can focus on the current
state with the efforts put in to handle the activities that damage to their property or any loss of
the lives. Along with this, ENISA need to focus on countering the threats that do not need in
controlling. Here, the technology change and so the new methods lead to the breach of security
which could easily be incorporated over the time (Vidal et al., 2017). There are different risks
related to the alignment of the asset owners in the smart phone which needs to be administered
with the terms of connectivity and the embedded functionality. It is also important to focus on
the connectivity with the functionality that is based on the issues of privacy and the access, and
the copyrights. The converged media devices are set with playing all the forms that are due to the
multiple designing. It results in the security and the privacy peculiarities, sharing the issues and
working on the vulnerabilities. The practices involve the designing of the smart home of the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

system, with the cloud based system and the designs. It will help in maintaining the framework
and work on the critical software separate from any of the non-critical applications (Fhom,
2015). The approach is set with the smart grid which are proved to be applicable for the smart
home contexts. The smart home is possible with the better information technology and the other
physical spacing that will help in bringing a change to the virtual and the physical contexts as
well (Karlsson et al., 2017).
and work on the critical software separate from any of the non-critical applications (Fhom,
2015). The approach is set with the smart grid which are proved to be applicable for the smart
home contexts. The smart home is possible with the better information technology and the other
physical spacing that will help in bringing a change to the virtual and the physical contexts as
well (Karlsson et al., 2017).

References
BACIVAROV, I. C. RAISA and IJISC-5 Years in the Service of Cybersecurity Culture Dissemination.
Baptista, M. R., Silva, N., Nostro, N., Zoppi, T., & Ceccarelli, A., (2017)., STECA–Security Threats,
Effects and Criticality Analysis: Definition and Application to Smart Grids.
D'Acquisto, G., Domingo-Ferrer, J., Kikiras, P., Torra, V., de Montjoye, Y. A., & Bourka, A. (2015). Privacy
by design in big data: An overview of privacy enhancing technologies in the era of big data
analytics. arXiv preprint arXiv:1512.06000.
Fhom, H. S. (2015). Big Data: Opportunities and privacy challenges. arXiv preprint arXiv:1502.00823.
Jarmakiewicz, J., Parobczak, K., & Maślanka, K. (2017). Cybersecurity protection for power grid control
infrastructures. International Journal of Critical Infrastructure Protection.
Jerome, J. W. (2013). Buying and Selling Privacy: Big Data's Difference Burdens and Benefits. Stan. L.
Rev. Online, 66, 47.
Karlsson, F., Hedström, K., & Goldkuhl, G. (2017). Practice-based discourse analysis of information
security policies. Computers & Security, 67, 267-279.
Karlsson, F., Karlsson, M., & Åström, J. (2017). Measuring employees’ compliance-the importance of
value pluralism. Information & Computer Security, 25(3).
Michael, K., & Michael, M. G. (2013). No limits to watching?. Communications of the ACM, 56(11), 26-28.
Mohammad, B., Fredriksson, J., Mathiesen, A., Roxbergh, C., & Örtenberg, E. (2017). Open Source
Security Token for Linux.
Pattabiraman, A., Srinivasan, S., Swaminathan, K., & Gupta, M. (2018). Fortifying Corporate Human Wall:
A Literature Review of Security Awareness and Training. In Information Technology Risk
Management and Compliance in Modern Organizations (pp. 142-175). IGI Global.
Payton, T., & Claypoole, T. (2014). Privacy in the age of Big data: Recognizing threats, defending your
rights, and protecting your family. Rowman & Littlefield.
Perera, C., Ranjan, R., & Wang, L. (2015). End-to-end privacy for open big data markets. IEEE Cloud
Computing, 2(4), 44-53.
BACIVAROV, I. C. RAISA and IJISC-5 Years in the Service of Cybersecurity Culture Dissemination.
Baptista, M. R., Silva, N., Nostro, N., Zoppi, T., & Ceccarelli, A., (2017)., STECA–Security Threats,
Effects and Criticality Analysis: Definition and Application to Smart Grids.
D'Acquisto, G., Domingo-Ferrer, J., Kikiras, P., Torra, V., de Montjoye, Y. A., & Bourka, A. (2015). Privacy
by design in big data: An overview of privacy enhancing technologies in the era of big data
analytics. arXiv preprint arXiv:1512.06000.
Fhom, H. S. (2015). Big Data: Opportunities and privacy challenges. arXiv preprint arXiv:1502.00823.
Jarmakiewicz, J., Parobczak, K., & Maślanka, K. (2017). Cybersecurity protection for power grid control
infrastructures. International Journal of Critical Infrastructure Protection.
Jerome, J. W. (2013). Buying and Selling Privacy: Big Data's Difference Burdens and Benefits. Stan. L.
Rev. Online, 66, 47.
Karlsson, F., Hedström, K., & Goldkuhl, G. (2017). Practice-based discourse analysis of information
security policies. Computers & Security, 67, 267-279.
Karlsson, F., Karlsson, M., & Åström, J. (2017). Measuring employees’ compliance-the importance of
value pluralism. Information & Computer Security, 25(3).
Michael, K., & Michael, M. G. (2013). No limits to watching?. Communications of the ACM, 56(11), 26-28.
Mohammad, B., Fredriksson, J., Mathiesen, A., Roxbergh, C., & Örtenberg, E. (2017). Open Source
Security Token for Linux.
Pattabiraman, A., Srinivasan, S., Swaminathan, K., & Gupta, M. (2018). Fortifying Corporate Human Wall:
A Literature Review of Security Awareness and Training. In Information Technology Risk
Management and Compliance in Modern Organizations (pp. 142-175). IGI Global.
Payton, T., & Claypoole, T. (2014). Privacy in the age of Big data: Recognizing threats, defending your
rights, and protecting your family. Rowman & Littlefield.
Perera, C., Ranjan, R., & Wang, L. (2015). End-to-end privacy for open big data markets. IEEE Cloud
Computing, 2(4), 44-53.

Polemi, N., & Papastergiou, S. (2017). Assessing the Risk of Ports and Their Supply Chains: The CYSM,
MEDUSA, and MITIGATE Approaches. Handbook of Cyber-Development, Cyber-Democracy,
and Cyber-Defense, 1-29.
Soria-Comas, J., & Domingo-Ferrer, J. (2016). Big data privacy: challenges to privacy principles and
models. Data Science and Engineering, 1(1), 21-28.
Topping, C. (2017). The role of awareness in adoption of government cyber security initiatives: A study of
SMEs in the UK.
Van Dijck, J. (2014). Datafication, dataism and dataveillance: Big Data between scientific paradigm and
ideology. Surveillance & Society, 12(2), 197.
Vidal, J. M., Orozco, A. L. S., & Villalba, L. J. G. (2017). Malware Detection in Mobile Devices by
Analyzing Sequences of System Calls. World Academy of Science, Engineering and Technology,
International Journal of Computer, Electrical, Automation, Control and Information
Engineering, 11(5), 555-559.
Woods, D., & Simpson, A. (2017). Policy measures and cyber insurance: a framework. Journal of Cyber
Policy, 1-18.
MEDUSA, and MITIGATE Approaches. Handbook of Cyber-Development, Cyber-Democracy,
and Cyber-Defense, 1-29.
Soria-Comas, J., & Domingo-Ferrer, J. (2016). Big data privacy: challenges to privacy principles and
models. Data Science and Engineering, 1(1), 21-28.
Topping, C. (2017). The role of awareness in adoption of government cyber security initiatives: A study of
SMEs in the UK.
Van Dijck, J. (2014). Datafication, dataism and dataveillance: Big Data between scientific paradigm and
ideology. Surveillance & Society, 12(2), 197.
Vidal, J. M., Orozco, A. L. S., & Villalba, L. J. G. (2017). Malware Detection in Mobile Devices by
Analyzing Sequences of System Calls. World Academy of Science, Engineering and Technology,
International Journal of Computer, Electrical, Automation, Control and Information
Engineering, 11(5), 555-559.
Woods, D., & Simpson, A. (2017). Policy measures and cyber insurance: a framework. Journal of Cyber
Policy, 1-18.
1 out of 13
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.