1) Provide a brief overview of the case study and prepare a diagram for the ENISA Big Data security infrastructure.
2) Out of the ‘’Top threats’’ which threat would you regard to be the most significant and why?
3) Identify and discuss the key Threat Agents. What could be done to minimize their impact on the system? Based on the data provided, discuss the trends in threat probability.
4) How could the ETL process be improved? Discuss.
5) To sum up, should ENISA be satisfied with its current state of IT Security? Why? Or Why not?
Scenario and diagram of Big Data security infrastructure
Risk analysis as well as security is considered as crucial for enterprises in order to deploy effective operations along with integration of development of the system. In this perspective, development of the project would assist to integrate the process of development of operations as well as apply effective functions within the particular organization. Moreover, operational processing can be implied in order to form analysis risks associated with the organization. The operational processing can be implied in order to form analysis of risks might be faced by the organizations at the time of performing operations as well as functions based on development of operations for integration of functions for procedures of the enterprise.
The report would assist the process of integrating the functions and operations of the organization in order to develop risk assessment as well as analysis. In addition, it would tend evaluating the role of technology for implementation of effective risk through analysing the case study of ENISA. Practicing big data strategy would enhance operations within the organization. On the other hand, the use of big data in the organization has identified the issues as well as threats of security for the enterprise. Thus, analysis of threats of Big data strategy for ENISA would describe agents of threats.
1.1 Overview of ENISA case studyThe organization had implemented big data analytics in order to develop effective operations as well as growth of the organization. ENISA implied big data strategy inside the organization in order to gain competitive advantages. In this perspective, risks as well as threat management need to be implied for developing effective growth of operations. Big data threats would result in development of occasional threats for ENISA in integrating the system within the organization. The enterprise is considered as one of the effective operation system, which is capable monitoring flow of the operations within the enterprise as well as imply efficient security system inside the enterprise(Chen, Mao& Liu, 2014). However, privacy in big data is considered as major factor playing a crucial role in implantation of development model for ENISA. In this perspective, operations of the enterprise would be highly enhanced through utilization of big data strategy inside the organization.
On the other hand, ENSIA had applied ICT solutions improving security functions in order to manage big data strategy in the enterprise (Demchenko et al.,2013).Various owners are providing various models for the transformation of the ICT devices in the organisation including data owners, data transformers and computation(Kshetri, 2014). These models helps in providing effective management if the data and security to the data and information. There are various practices that are analytics in the organisation for managing threat and management of data used y the organisation. The process of operating in the organizations implied in the risk management for acquiring the security of information and data in the organisation. Therefore, the development of the risk management assessment helps in maintaining security of data as well as information in the enterprise.
The framework of the ENISA has been properly structured of operating effectively in the big data strategy. Therefore, the big data infrastructure helped in maintaining the data sources, data storage and analytics with computing models under the presentation layer. In addition, the security infrastructure of big data security has been prepared using Ms-Visio by maintaining the architecture of the big data security strategy is show below:
ENISA Big Data Security Infrastructure Diagram
The layered structure of the ENISA has able to maintain the big data deployment as well as integration to maintain growth of the system in the company (Bansal, 2014).The effective implementation of the big data analytics has helped in developing the organisation in the market. There are various layers of the big data including the data sources, analytics, data storage, and presentation layer and computing models (Thuraisingham, 2015). The operations of the big data structure have been able to eliminate the security threats in the database of the company.
The security information of the organisation has been maintaining security of data as well as information of the enterprise. There are various security protocols used by the company in the market including Ranger, Encryption, KNOX and Firewall (Erl, Khattak& Buhler, 2016). These security measures help in maintaining the security of the big data structure of the organisation. The specific function related to the database of the ENISA has been shown in the table below:
Functions of security |
Description |
Big data structure layer |
Elements included in structure layer of ENISA |
KNOX |
It has specific solution as well as real time protection of data sources after adding. In addition, the effective control of making strategies could be implied for developing enhanced control of the functions in security. |
Data Sources layer |
This layer includes elements of streaming data from the sensors, and unstructured data as well as structured data. |
Ranger |
It is considered as authorization system, assists in limiting user access in the system of big data with the help of ranger policies. The user needs to request to Ranger in order to get authenticated entry into specific system. |
Integration Process layer and Analytics as well as Computing Models layer |
Integration Process layer consists of the components of ETL, Messaging and API. Analytics as well as computing models layer consists of components query, reporting. In addition, Map Reduce, and Advanced Analytics as well as Stream Analytics are included in this. |
Firewall |
Firewall is one of the best protection systems for the network security issues. In addition, wireless devices tend to develop effective prevention of information from unknown sources. |
Presentation layer |
The elements of Web Browser and Desktops as well as Mobile Devices, are include in presentation layer. |
Encryption |
It is one of the most secured ways in order to protect data from unknown as well as unauthenticated source. In this perspective, the data would be modified utilizing cryptography technique so that it becomes useless for different users. |
Data Storage layer |
Data Storage layer consists of components of No/New SQL databases and Distributed File System as well as RDF stores |
Table 1: Various Security functions for ENISA Big Data System
(Source: Bansal &Kagemann, 2015)
The threats to the ENISA big data strategy of the company have been depicted by the accidental threats, technological threats, threats to the organisation and different legal treats. These types of threats are very common in the organisation (Lu et al., 2014). Therefore, there are various strategies made to mitigate these issues in the organisation. The hindrance to the normal management of the company has been maintained by the operations in the market (Baumer, 2017). There are various risks and threats for the ENISA has been provided in the tabular format below:
Threat Types |
Examples of the Risk Classification |
Accidental Threats |
Some examples of accidental threats are considered as destruction of records as well as leaks of data through web application and loss of device along with of sensitive data as well as loss of cloud information. In addition, penetration and testing damage and inadequate design are included in the process. Along with these, planning threat and change of data through mistake and unreliable source of data and human errors are included in the accidental threats. |
Threat of technology abuse |
Some examples of technology abuse are abuse of data leak, issues involved in social engineering and malicious code as well as abuse of authorization, business process failure, unsolicited emails, targeted attacks, denial of service and identity theft along with the unauthorized data breaches as well as misuse of the audit tools are included in the procedure. |
Deliberate Threats |
Deliberate threats are considered as network traffic issues, and interception of the server as well as information interception, and replay of messages, session hijacking as well as war driving in the middle attack. |
Organization Threat |
The organization threat consists of lack of IT skills |
Legal Threats |
Legal threats are considered as violation of regulation and failure in order to contractual needs and abuse of personal data as well as judiciary orders. |
Table 2: Threats and Risk involved in ENISA Organization
(Source: Lu et al., 2014)
The threat technology is a critical threat for the company in the market. The threats to the big data analysis in the company have been a major threat for the company the market. The threat of technology includes leak of information, brute force, and failure of business failures, authorisation abuse and malicious code generation in the company. These threats can be also categorised by targeted attacks, fraud, and email hacking and identity theft in the company. Therefore, there are several strategies prepared for maintaining the security from these threats on the company. The threat technology abuse has been the most critical threat for the ENISA in the market (Chen & Zhang, 2014). The cyber world has been suffered from this threat all over the world. The lea of the information has caused much loss to the company in the market. The sensitivity if the data and information has been proactive in the company that have caused threats to the data and information of the organization in the market. The unauthorised access to the database of the company has been causing the loss of data of the organization in the market.
The technological abuse threat in the ENISA has been depicted by the leak if the information, social engineering issues, brute force, denial of service, targeted attacks and manipulation of information in the company (Kim, Trimi& Chung, 2014). The key threats of the ENISA are Human errors, personal gain, designing errors and technology. These agents help in the deployment of the hindrances and detection of threat developing extortion of the procedure as well as enhancement of the issues in the enterprise.
Explanation of the Top Threat in the ENISA
Technology
The technology is considered as important factor in the growth of the effective operations in the ENISA. The improvement in the technological domain of the company might help in securing the data and information of the organization in the market. The technological deployment of the leak of information in the organisation has able to maintain the diplomacy of the strategies (Wu et al., 2014). The implication of the technological issues in the company has provided influential development in the effective flow of operation s in the company. The identified technological issues in the company has been properly analysed for the finding the strategies to mitigate them.
Human Errors
The human errors are the major factors in the form of the hindrances in the company. The system-integrated operations have able to manage the security risks involved in the management of the company (Patil & Seshadri, 2014). The errors that are made by the human cohesiveness are creating issues for the company. There are various human errors including information interception, replay if messages, hijacking, unauthorised data breaches and manipulation of hardware. The human including the employees and other staffs of the company manipulates these errors.
Designing Errors
The designing errors are depicted for systematic faults in the enterprise. These designing errors are confirmed by the implication of operational processing. These errors are prepared for the critical evaluation for the development of the organisation. Therefore, the business operations are reliable to the management of the company. For example, threat in planning, change of data, unreliable sources of information and failure in the business process.
Key Threat Agents |
Examples |
Impact |
Technology |
Leaks of data in the web application and loss of storage can be solved with the help of technology. In addition, loss of sensitive information, loss of cloud data, penetration testing as well as inadequate design along with planning threat |
Utilization of latest methods of Big Data deployment as well as Security Measures |
Human Errors |
Change of information by mistake, data interception and replay of messages as well as session hijacking can be solved by this. |
Utilization of enhanced IT skills for developing as well as usage of IT implementation principles is included in the process. |
Designing Errors |
Failure in business process, inadequate design as well as planning threat and change of data by mistake along with unauthentic source of data |
Using design forming methodology in order to develop effective flow of big data implementation |
Table 3: Mitigation Strategy
(Source: Cardenas, Manadhata & Rajan, 2013, pp-75)
Trends in threats probability
The analysis of the trends in the threat probability has been an integral part of the risk assessment processing the company (Vatsalan et al., 2017). The trends in the threat probability involve the development of the operations for the integration. The analysis of the risks management in the company can be implemented for mitigating the risks involved in the threat probability.
ENSIA had faced many performance issues in improving the database of the company in the market. The ETL process in the company can be improved in the various processes that are discussed below:
Utilization of minimum data
The batch processing has exhausted a reasonable amount of the memory storage through pulling a large amount of information for operations in ENISA. According to Kao et al. (2014), the extraction of minimum amount of the data and information is necessary for the development of the operation of the company.
Avoidance of row-by-row lookup
The process of the ETL usually utilizes row-by-row lookup strategy for performing data operations in the company. Although it is a time taking process compared to the bulk loading process. As commented by Patil&Seshadri, (2014), the bulk loading process the option of ETL is helpful and process fast and big volume of data in data operations.
The IT security of ENISA is developed for the maintaining the operation of the company in the market. The protection of data in the organization has been main goal if the company in the recent market. The main elements in the security in ENISA includes Ranger, Firewall, KNOX and Encryption (Mahajan,Gaba & Chauhan, 2016). These elements have been properly installed I the security layers of the company in the market.
The recent stricture of the company has been properly maintained in order to secure data in the organization. The deployment of IPS/IDS have helped in protecting network infiltration by identifying and preventing the access to the ENISA database.
Conclusion
It can be concluded that security of the ENISA has been a trending case in the market. The organisational structure has led to security threats in the company. The impact of the big data analytics in the organization have assisted in maintaining security of the data in the organization. The huge loading procedure of the ETL has helped in providing fast processing speed avoiding the row-by-row lookup in the strategies. Thus, use of KNOX, firewall, encryption as well as IDS/IPS would assist in order to protect network infiltration through identifying as well as preventing access to the ENISA database.
References
Rieb, A. J., Hofmann, M., Laux, A., Rudel, S., &Lechner, U. (2017). Wie IT-Security MatchplaysalsAwarenessmaßnahme die IT-Sicherheitverbessernkönnen.
Bansal, S. K. (2014, June). Towards a semantic extract-transform-load (ETL) framework for big data integration. In Big Data (BigData Congress), 2014 IEEE International Congress on (pp. 522-529). IEEE.
Bansal, S. K., &Kagemann, S. (2015). Integrating big data: A semantic extract-transform-load framework. Computer, 48(3), 42-50.
Baumer, B. S. (2017). A Grammar for Reproducible and Painless Extract-Transform-Load Operations on Medium Data. arXiv preprint arXiv:1708.07073.
Cardenas, A. A., Manadhata, P. K., &Rajan, S. P. (2013). Big data analytics for security. IEEE Security & Privacy, 11(6), 74-76.
Chen, C. P., & Zhang, C. Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Information Sciences, 275, 314-347.
Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171-209.
Demchenko, Y., Grosso, P., De Laat, C., &Membrey, P. (2013, May). Addressing big data issues in scientific data infrastructure. In Collaboration Technologies and Systems (CTS), 2013 International Conference on (pp. 48-55). IEEE.
Enisa.europa.eu. (2017). Big Data Threat Landscape — ENISA. [online] Available at: https://www.enisa.europa.eu/publications/bigdata-threat-landscape [Accessed 5 Sep. 2017].
Erl, T., Khattak, W., & Buhler, P. (2016). Big data fundamentals: concepts, drivers & techniques. Prentice Hall Press.
Guo, L., Wenqi, H., Xiaokai, Y., Fuzheng, Z., Chengzhi, C., &Shitao, C. (2016). Research and realization of improved extract–transform–load scheduler in China Southern Power Grid. Advances in Mechanical Engineering, 8(11), 1687814016679055.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Kao, R. R., Haydon, D. T., Lycett, S. J., & Murcia, P. R. (2014). Supersize me: how whole-genome sequencing and big data are transforming epidemiology. Trends in microbiology, 22(5), 282-291.
Kim, G. H., Trimi, S., & Chung, J. H. (2014). Big-data applications in the government sector. Communications of the ACM, 57(3), 78-85.
Kshetri, N. (2014). Big data? s impact on privacy, security and consumer welfare. Telecommunications Policy, 38(11), 1134-1145.
Lu, R., Zhu, H., Liu, X., Liu, J. K., & Shao, J. (2014). Toward efficient and privacy-preserving computing in big data era. IEEE Network, 28(4), 46-50.
Mahajan, P., Gaba, G., & Chauhan, N. S. (2016). Big Data Security. IITM Journal of Management and IT, 7(1), 89-94.
Patil, H. K., &Seshadri, R. (2014, June). Big data security and privacy issues in healthcare. In Big Data (BigData Congress), 2014 IEEE International Congress on (pp. 762-765). IEEE.
Sagiroglu, S., &Sinanc, D. (2013, May). Big data: A review. In Collaboration Technologies and Systems (CTS), 2013 International Conference on (pp. 42-47). IEEE.
Thuraisingham, B. (2015, March). Big data security and privacy. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (pp. 279-280). ACM.
Vatsalan, D., Sehili, Z., Christen, P., & Rahm, E. (2017). Privacy-Preserving Record Linkage for Big Data: Current Approaches and Research Challenges. In Handbook of Big Data Technologies (pp. 851-895). Springer International Publishing.
Wu, X., Zhu, X., Wu, G. Q., & Ding, W. (2014). Data mining with big data. IEEE transactions on knowledge and data engineering, 26(1), 97-107.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). ENISA Big Data Security Infrastructure: Threats, Trend Analysis, And ETL Improvements Essay.. Retrieved from https://myassignmenthelp.com/free-samples/bfa522-risk-management/data-mining.html.
"ENISA Big Data Security Infrastructure: Threats, Trend Analysis, And ETL Improvements Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/bfa522-risk-management/data-mining.html.
My Assignment Help (2021) ENISA Big Data Security Infrastructure: Threats, Trend Analysis, And ETL Improvements Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/bfa522-risk-management/data-mining.html
[Accessed 03 December 2024].
My Assignment Help. 'ENISA Big Data Security Infrastructure: Threats, Trend Analysis, And ETL Improvements Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/bfa522-risk-management/data-mining.html> accessed 03 December 2024.
My Assignment Help. ENISA Big Data Security Infrastructure: Threats, Trend Analysis, And ETL Improvements Essay. [Internet]. My Assignment Help. 2021 [cited 03 December 2024]. Available from: https://myassignmenthelp.com/free-samples/bfa522-risk-management/data-mining.html.