Itc596 It Risk Management- Enisa Assessment Answers
And answer the following Questions:
1) Provide a brief overview of the case study and prepare a diagram for the ENISA Big Data security infrastructure.
2) Out of the Top threats which threat would you regard to be the most significant and why?
3) Identify and discuss the key Threat Agents. What could be done to minimize their impact on the system? Based on the data provided, discuss the trends in threat probability.
4) How could the ETL process be improved? Discuss.
5) To sum up, should ENISA be satisfied with its current state of IT Security? Why? Or Why not?
Answers
1) Provide a brief overview of the case study and prepare a diagram for the ENISA Big Data security infrastructure.
The case is about how the big data has been able to use in the different sectors. The research institutions and the government agencies work towards the activation of the Big data technologies where the business players and the providers work on the creation of new products and the services. (Arora et al., 2013). The development of the new business models is massively based on the aggregation and the analysis which is for the fast growth of the data volume. The experiences are related to provide a dynamic change and increase in efficiency and the effectiveness from the complex organisation and communities. The big data tends to handle the different security risks which also includes how there are attack targets by the threat agents which are found to be elaborated with the specialised kind of attacks. The collection and the processing of the information has given rise to the privacy concerns with the wide scale electronic surveillance, profiling and setting the disclosure to the private data. The extensive collection and the processing of the personal information is based on the major rise to the serious privacy concerns which relate to the wider scale of the profiling, disclosure of the private data. It also allows the benefits of the analytics which includes the setup without invading the private sphere patterns (Pearson, 2013). ENISA is a centre for the expertise for the cyber security in Europe which works towards the contribution of the high level of the network and the information security (NIS). It works with the development and promoting the new culture of NIS which is mainly to assist the functioning of the internal market. The security standards and the benefits of scale are for implementing the security on the large systems with the costs for the implementation based on the sharing of the resources with the investments that end up to the effective cost saving methods. The security is considered to be the market differentiator with the integrity and resilience that is the priority for the other end users. The competition is mainly based on providing a high-level service with standardised interface for the management of security and working on the interfaces that are for the handling of security with the uniformity and testing the solutions in a proper manner. ENISA is the centre of expertise for the cyber security in Europe which focus on the preparation for preventing, detecting and responding to the information security problems. The ENISA includes the organisation of the cross-Europe cyber crisis with promotion of the cooperation in between the computer emergency response team and the capacity building. It also focusses on the cloud security and the data protection, enhancement of the technology and ensuring the privacy with the new technologies and then identifying the cyber threats (Almorsy et al., 2016).
2) Out of the ‘’Top threats’’ which threat would you regard to be the most significant and why?
The threats are related to the web based attacks where the major dangers come from “top danger” which is in light and is found to be greater with the particular part of the organisation. The risks are digital hoodlums with the choice to get the data and work on the electronic or web application attacks. It is considered to be significant web attack which has been for the programmers that mainly focus on the benefits of the program help and handle the unsafe capacity in light. The facts are related to the forms where there is no major need to handle the start for the downloading of any vindictive substance. With this, there are other instances for the attack like click jacking which leads to the misalignment routines of the controlling of the site client’s action and working on the coverage of hyperlinks to goodness with interactive substances. In this way, the client is able to perform the activities which they are unknown of. This the other substance which focus on the site of the undetectable edge with getting the clicks mainly from the client from any of the edge parts (Fabian et al., 2015). The pop ups are mainly to showcase which does not contain any of the pernicious substances with tapping the specific parts that tends to prompt about the malevolent software. Hence, the clients and the other associations are set with the mindful that is set with the different kind of dangers. The organisation works on the web proximity with the risks that are being struck. Hence, for this, the level of threats is found to be for each and every affiliation, where the few variables also take part into the thoughts with choice of how the threat levels are measured with insightful property. The identifiable information is set with the particular affiliation process. The attacker breaks into the legitimate website and the posts malware with the attack on the end user machines. The malware on the website makes their way for the user machine when the user visits the website of the host. The additional techniques does not need any input from the user but they are effective for handling the leveraging effects with the end user machines for the different malicious activities. the establishment is mainly for the illicit sites like the adult material and the pirated software where the mainstreams are complexity of the websites and the web advertisements. The SQL injection attack are also considered the major threats for ENISA where there is a possibility to find the flaws in the website that have the database which is running for the poorly validated inputs. The malicious advertisements are generally hosted by the third-party advertising sites with the random appearances for the compounds and detection (Hashizume et al., 2013). The attacks are on the backend of the virtual hosting companies, and the cross-site scripting attacks.
3) Identify and discuss the key Threat Agents. What could be done to minimize their impact on the system? Based on the data provided, discuss the trends in threat probability.
The threats are related to the cyber terrorism, script kiddie, online social hacking. It is important to minimise the possibility of the attacks on the system which is only possibility through the creation of a password which is strong enough that no one is able to detect it. With this, there is a need of the two-factor authorisation and authentication which includes the sending of the code to the tab and then entering into the account. The update to the software is required when it is needed. The counteractive action is about the superior planning with cleaning up the break of the security or any web attack. The attacks are mainly based on relying over the end client committing with the error of tapping on the connections. The reason for the security is based on working over the reasons of mindfulness and the training which is important for the general security of the system association. The chance is about working over the end clients with the scope that includes how the dangers or the other activities are mapped for the contribution to a particular variable. The clear strides are also for the event where one sees something suspicious. The odds are mainly related to work on the event with the suspicious levels where the odds are et with the progressing security (Khalil et al, 2014). The avoidance of sending the personal data will help in removing and preventing the phishing when the page belongs to a particular website of the company. It is designed by someone else where the threat agents need to focus on the script kiddies who have no major ideas about the programming. The people try to hack, by using some other scripts and some try to hack for fun. The script kiddie is for the unskilled individual who works on the use of the scripts or the programs based on the attack of the computer systems and the network. The assumptions are based on the lack of the ability to write any sophisticated programs and work on the objectives to gain credit in the computer enthusiast communities. The script kiddies also have their disposal to the different effective programs which includes the breaching of the computers and the networks. Hence, the vulnerability leads to the security auditing with the vandalising of the websites mainly for the thrill. The major issue is in the development and the programming skills which is sufficient to understand the effects and other side actions. The cyber terrorisms are mainly to use the Internet to conduct any of the violent attacks which can lead to the loss of the data. The consideration is about handling the acts of deliberate and the large-scale disruptions which mainly comes with the internet computer virus. The relation is mainly to the deployments with the attacks against the information systems. The cybercrime is considered to be depending upon the attacks which are set with the use of the computer networks and the public internet that leads to the destruction and harm mainly for the personal objectives (Islam et al., 2016).
4) How could the ETL process be improved? Discuss.
The ETL process is mainly for the reconciliation of the data which includes how the data is loaded and work on the updates. It includes the mapping of the metadata management with the data that needs to handle the warehouse and mapping to the operational system. The extraction, cleansing and the loading is requirements for properly capturing all the data from the source of the system. The data is cleansed depending upon the misspelled names, delicacy of the data is also removed (Jones et al., 2017). In ETL 2014, there are details for the development which is consolidated by the top cyber security threats and the emerging threat trends. It includes the analysis and the works on the collection, collation and the analysis to produce the cyber threat assessment. ETL is based on 400 sources with the involvement of the use case of threat intelligence. To handle and tackle with the log metrics like the time and the number of records processed, ETL processes can be improved. The loading of the data can be done in an incremental manner with the maintenance and partitioning of the large tables. The cache of the data depends on the memory access performance with cutting out the extraneous data based on how the data enter the warehouse. Along with this, there is a possibility to process in parallel and work on the optimisation of the resources with processing standards to sort and work on the aggregate functions. The ETL can also be improved with the use of Hadoop in the distributed processing of the large data. This works with the use of HDFS with dedicated file system that cuts the data into the smaller chunks and optimising the spreads over the entire cluster. The filtering and the sorting of the data, with reduced summary operations where the data from the previous stages is also combined. The ERL processes includes the loading of the data to stage and filter with the effective approaches to capture the snapshot of the changed records at the source (Yang et al., 2015). With this, the ETL also include the metadata which is for determining the exact records that could be used for the transferring. The production of the extract tables comes through the populated standards with the data where the ETL is other way to make sure that the rows have been loaded. The batching is effective when there is a possibility to make use of the logical partitioning which allows the extractions to be performed in the different times. With this, there is a possibility to reduce any of the concurrent network loading with the resource content at the staging database. The strategy is mainly to extract the huge amount of the data where when the process fails, then it would lead to start the process itself.
5) To sum up, should ENISA be satisfied with its current state of IT Security? Why? Or Why not?
ENISA should, ideally be not satisfied with the current state with the states of the IT security. The usage is based on the strong engineering capabilities with the development of certain steps that are based on avoiding any of the security issues. The competitiveness is based on how the attackers in the cyber security and the data protection are able to handle and overcome the threats of the government. For this, there is a consistent adaptation to the technological advancements with the sensitive data being stored with some of the accurate precautions which are important. The threats with the sensitive information is accessible which needs to be protected through the firewall and blocking any of the unauthorised access. ENISA need to also focus on the opposition powers where there are points related to the assorted qualities which also has certain security suggestions (Brender et al., 2013). I also feel that ENISA need to focus on the interests of the data security area with the European Commission to guarantee for controlling the presented forms of the different purposes. It does not hurt the security analysts and the firms. ENISA also need to focus on handling the exhibits which are related to the exemplary performances in 2014, where the challenges are mainly to combat the threats of the hackers and work on the activities which might bring damage to the property or loss of lives. This makes the situation worse with the fact that there are long term damages to the infrastructures. The effects of the activities are based on the damage to the property with the even loss of lives. The situation is found to be worse with the fact that there is a gradual increase in the population and time, with the different skilled workers and the hackers who work towards the success in completing hacking the system and leading to the security breach of the system. ENISA is considered to not be contended with the current security state as more efforts are added with the required counter threats and they are not able to succeed in controlling the system patterns. Moreover, it is also important for the technology with the new methods to handle the beaching security which is incorporated over the time. ENISA need to focus on the business processes which are linked with the information and communication technology. The series are set with the easy management of the processes and the integrated plans that tend to maintain the critical processes of the organisation. The disruptive event takes place with the major impact on the critical processes of the organisation (Jones et al., 2017). ICT systems and the electronic data is important for the processes and the protection that includes the different regulatory bodies. The financial evidence is about the incentives with the insurance companies working on the Business Continuity Management penetration plan rather than focusing on the facilities that tend to reduce the effect of the disaster and provide the backup of the ICT services.
Reference
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Arora, R., Parashar, A., & Transforming, C. C. I. (2013). Secure user data in cloud computing using encryption algorithms. International journal of engineering research and applications, 3(4), 1922-1926.
Brender, N., & Markov, I. (2013). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International journal of information management, 33(5), 726-733.
Fabian, B., Ermakova, T., & Junghanns, P. (2015). Collaborative and secure sharing of healthcare data in multi-clouds. Information Systems, 48, 132-150.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5.
Islam, T., Manivannan, D., & Zeadally, S. (2016). A classification and characterization of security threats in cloud computing. Int. J. Next-Gener. Comput, 7(1).
Jones, S., Irani, Z., Sivarajah, U., & Love, P. E. (2017). Risks and rewards of cloud computing in the UK public sector: A reflection on three Organisational case studies. Information Systems Frontiers, 1-24.
Khalil, I. M., Khreishah, A., & Azeem, M. (2014). Cloud computing security: a survey. Computers, 3(1), 1-35.
Pearson, S. (2013). Privacy, security and trust in cloud computing. In Privacy and Security for Cloud Computing (pp. 3-42). Springer London.
Yang, Y., Liu, J. K., Liang, K., Choo, K. K. R., & Zhou, J. (2015, September). Extended proxy-assisted approach: achieving revocable fine-grained encryption of cloud data. In European Symposium on Research in Computer Security (pp. 146-166). Springer, Cham.
Buy Itc596 It Risk Management- Enisa Assessment Answers Online
Talk to our expert to get the help with Itc596 It Risk Management- Enisa Assessment Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.