Risk analysis as well as security is considered as an important concept for the organizations as it generally assists in developing proper operations for integrating the flow of system development. According to Baumer (2017), the entire project development would be quite helpful in integrating various operations development so that it can be applied properly within the functions of the organization. The operational processing is generally utilized for analyzing risks that are generally faced by the organization while performing various types of functions as well as operations (Chen & Zhang, 2014). It is identified that the development of proper risk analysis is very much dependent on the development of operations for various processes of the organization.
The report generally assists in integrating various types of operations of organization for implementing proper risk assessment strategies. The report mainly evaluates the role of technology in implementing proper risk assessment for the case study ENISA. It is identified that the practice of big data strategy is quite helpful in improving various types of operations within organizations. However, it is analyzed that the practice of big data also forms number of threats as well as issues of security for the entire organization. The analysis of threat of big data strategy for ENISA helps in discussing the various threat agents.
Brief overview of the case study
The European Union agency for network and information security (ENISA) is one of the centers of information security and network expertise for European Union and its various member states. It is identified that the organization “ENISA” generally works with various groups and develop proper recommendation as well as advice on various good practices of information security (Enisa.europa.eu 2017). The organization mainly assists EU and its member states for implementing appropriate legislation that will be helpful in improving the resilience of Europe’s critical network as well as infrastructure. The ENISA generally seeks for enhancing the existing expertise in the member states of EU by supporting various cross-border communities who are generally committed for improving the information security as well as network throughout EU.
Big data infrastructure diagram for ENISA
ENISA have generally utilized structured framework in order to imply effective operation of big data strategy. It is identified that big data infrastructure is generally developed by implementing proper information processing system. The diagram for big data infrastructure is provided below:
Figure 1: Big data infrastructure for ENISA
(Source: Created by Author)
The different types of threats that are associated with big data strategy of ENISA is mainly divided into number of categories that include deliberate threats, accidental threats, organizational threats, legal threats as well as threat related with technology issue (Demchenko et al., 2013). It is identified that the threats that are mainly associated with the big data strategy can create hindrance in improvement as well as development of different type of functions that are mainly associated with ENISA. The table below helps in reflecting the various types of threats and associated risk, which are mainly related with ENISA organization.
Types of threats |
Risk classification example |
Accidental threats |
Different types of accidental threats generally include loss of various types of sensitive information, cloud information, inadequate design, planning improper source of information, change of data, and loss of various types of cloud information as well as testing damage (Hashem et al., 2015). |
Threat related with technology issue |
Various examples that is mainly associated with technology related issue mainly include issues related with social engineering, business procedure failure, targeted attacks, information manipulation, identity theft, authorization abuse, unsolicited emails, hoax, audit tools misuse as well as manipulation of software and hardware (Kshetri, 2014). |
Organization threat |
It is identified that organizational threat causes shortage of various type of IT related skills. |
Deliberate threat |
Various types of examples of deliberate threats include information interception, war driving, session hijacking, radiation of interfering, interception of server and more |
Legal threat |
Number of examples of legal threat like violation of regulation, judiciary order, abuse of different types of personal data, failure of meeting various contractual requirements (Patil & Seshadri, 2014). |
Threat of technology abuse is considered as the most critical threat when numbers of implications related with big data analysis are utilized in order to develop proper as well as appropriate control strategies. It is identified that the threat of technology abuse generally include issues related with social engineering, business procedure failure, targeted attacks, information manipulation, identity theft, authorization abuse, unsolicited emails, hoax, audit tools misuse as well as manipulation of software and hardware (Vatsalan et al., 2017). It is found that threat of technology abuse is the most significant threat, which is mainly associated with development of operations that generally causes issues with the integration of organization. It is identified that the technology related issue generally occur for harming the organization unintentionally (Wu et al., 2014). In addition to this, it is identified that this issue mainly also creates issue related with operations integration. It is analyzed that information leak generally creates number of issues that are mainly associated with sensitive as well as confidential information.
Discussion of key threat agents
The threat that is associated with technology abuse generally include social engineering, business procedure failure, targeted attacks, information manipulation, identity theft, authorization abuse, unsolicited emails, hoax, audit tools misuse as well as manipulation of software and hardware. The key threat agent that is mainly associated with ENISA includes human errors, designing errors, technology as well as personal gain. It is identified that the agents would involve in deployment of various types of hindrances as well as issues that are associated with operation development (Mahajan, Gaba & Chauhan, 2016). It is found that involvement of effective methods of threat analysis as well as detection helps in forming extortion of procedure and development of various types of hindrances within the organization.
Technology: Technology is considered as the most important factor, which helps in forming issues in development of effective operations. The technology related deployment generally helps in serving automatic processing of issues as well as challenges regardless of various operations (Kao et al., 2014). It is identified that implications of various types of technological issue generally comprises of forming proper influential development for effective flow of various operations. It is identified that various types of technological hindrances mainly causes deployment of various simple as well as achievable operation.
Designing errors: It is identified that various types of designing errors are generally implied due to improper influential as well as systematic operation within the organization. The designing errors are generally helpful in forming various types of implications that are mainly associated with operational processing (Kim, Trimi & Chung, 2014). It is found that designing errors generally occur due to the implication of various types of incorrect model of development. The errors associated with designing are generally developed in order to evaluate the prone as well as effective development of operation. For example, business procedure failure, change of data, unreliable information source and inadequate design.
Human errors: The human error are mainly considered as one of the factor that generally helps in forming hindrances in the development of various types of big data analytics for the development of organization. It is identified that influence associated with integrated system operation helps in implementing proper evaluation of human functions as well as actions. But the problems or errors that are generally occurred by the human are generally found to be cohesive in order to form various types of issues in function development (Sagiroglu & Sinanc, 2013). The various types of human made errors are very much responsible for deploying various types off improved functions. The examples include replay messages, information interception, hijacking session, manipulation of information, unauthorized breaches of data as well as manipulation of software as hardware.
Ways that helps in minimizing the impact of key threat agents on the system
Key threat agents |
Examples |
Reduction options impact |
Human errors |
Leaks of various types of data with the help web application, loss of various types of cloud information, damage due to penetration testing as well as inadequate design (Thuraisingham, 2015). |
Utilization of various latest methods of security measures as well as big data implementation. |
Technology |
Information interception, session hijacking, unauthorized data breaches, information manipulation, change of data by mistake and manipulation of various software and hardware. |
It is identified that improved IT skills are generally utilized for developing as well as utilizing various principles that are mainly associated with IT implementation. |
Designing errors |
Planning threat, business procedure failure, change of various data by mistake, unreliable source of information, planning threat and problems due to inadequate planning |
In order to form proper flow for big data implementation, it is quite important to use proper methodology of design development (Lu et al., 2014). |
Discussion of trends in threat probability
It is found that the trend in threat probability can be implied in order to form the analysis of various threats within the organization. The trends that are associated with threat probability helps in forming effective flow of information. It generally assists in involving various types of critical deployment of operation for integrating the different operations (Guo et al., 2016). It is identified that the probability of threat occurrence mainly deals with the development as well as integration of various type of operations that assists in developing improved as well as effective functional operations for deployment of effective analysis for risk assessment (Bansal, 2014). The diagram below helps in reflecting the probability trends with effective time passage.
Figure 2: Threats probability trend
(Source: Erl, Khattak & Buhler, 2016, pp.67)
It is identified that ENISA generally faces number of issues that are mainly associated with database scaling as it would generally helps in developing slackness of various operations within the organizations. The ETL procedure can be improved by utilizing number of practices in ENISA, which include:
Use of minimum data: The data processing would be helpful in exhausting the considerable amount of memory storage for pulling huge amount of data for various types of operations that are mainly associated with ENISA (Chen, Mao & Liu, 2014). However, it is found that extraction of minimum data helps in enabling improvement of various performances of data operations.
Avoidance of Row by row backup: The ETL procedure generally utilizes row-by-row lookup for performing number of operations. However, it is identified to e slower as well as time consuming in nature when it is compared with bulk loading. It is analyzed that bulk loading is one of the option that mainly helps in processing large amount of data faster.
Implementation of proper security measures: It is identified that implementation of appropriate security measures like cryptography as well as encryption must be implemented for protecting the data as well as for preventing various types of unauthorized access (Kim, Trimi & Chung, 2014). It is found that both cryptography method as well as encryption of of data is advantageous for the organization as they generally helps in protecting the data thus it is analyzed that it provides proper protection to big data.
Access control: Access control is considered as another appropriate methodology that helps in providing proper data security (Thuraisingham, 2015). It generally prevents unauthorized data access. Nowadays data theft is a major issue or challenge in cloud computing if the host of cloud provides generally implements proper access control then this type of challenges will be minimized.
It is identified that IT security related with ENISA is mainly implied for developing various operations of the organization that mainly assists in protecting the structure of big data from various security threats (Cardenas et al., 2013). It is found that IT related security is quite helpful in forming the protection of the existing data as well as information from various risk factors as well as threats. The key elements of security include KNOX and ENISA, firewall, ranger as well as encryption. The elements are installed with proper specific layers of the structure of big data for ENSA.
The current structure of the security of ENISA is quite compact and thus it helps in forming information as well as data for the development of various types of facilities. KNOX, encryption, firewall as well as ranger help in protecting various layer of big data structure for ENISA (Bansal & Kagemann, 2015). However, it is identified that implementation of IDS/IPS helps in protecting the infiltration of network by preventing as well as detecting access to the database of ENISA.
Conclusion
It can be concluded from entire assignment that utilization of big data helps in developing various types of issues as well as threats of information processing that are associated with the organization. It is identified that the major impact on information processing of big data analytics generally helps in forming proper hindrances for the processes of ENISA. The procedure of ETL can be improved if utilization of data is made proper by avoiding row-by-row look up. T is found that bulk-loading option that is associated with ETL helps in processing large volume of data in various data operations. In order to protect the network related infiltration, it is identified that use of Ranger, KNOX, encryption as well as firewall helpful as they also detect as well as prevent the access of the database that is associated with ENISA.
References
Bansal, S. K. (2014, June). Towards a semantic extract-transform-load (ETL) framework for big data integration. In Big Data (BigData Congress), 2014 IEEE International Congress on (pp. 522-529). IEEE.
Bansal, S. K., & Kagemann, S. (2015). Integrating big data: A semantic extract-transform-load framework. Computer, 48(3), 42-50.
Baumer, B. S. (2017). A Grammar for Reproducible and Painless Extract-Transform-Load Operations on Medium Data. arXiv preprint arXiv:1708.07073.
Cardenas, A. A., Manadhata, P. K., & Rajan, S. P. (2013). Big data analytics for security. IEEE Security & Privacy, 11(6), 74-76.
Chen, C. P., & Zhang, C. Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Information Sciences, 275, 314-347.
Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171-209.
Demchenko, Y., Grosso, P., De Laat, C., & Membrey, P. (2013, May). Addressing big data issues in scientific data infrastructure. In Collaboration Technologies and Systems (CTS), 2013 International Conference on (pp. 48-55). IEEE.
Enisa.europa.eu. (2017). Big Data Threat Landscape — ENISA. [online] Available at: https://www.enisa.europa.eu/publications/bigdata-threat-landscape [Accessed 5 Sep. 2017].
Erl, T., Khattak, W., & Buhler, P. (2016). Big data fundamentals: concepts, drivers & techniques. Prentice Hall Press.
Guo, L., Wenqi, H., Xiaokai, Y., Fuzheng, Z., Chengzhi, C., & Shitao, C. (2016). Research and realization of improved extract–transform–load scheduler in China Southern Power Grid. Advances in Mechanical Engineering, 8(11), 1687814016679055.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Kao, R. R., Haydon, D. T., Lycett, S. J., & Murcia, P. R. (2014). Supersize me: how whole-genome sequencing and big data are transforming epidemiology. Trends in microbiology, 22(5), 282-291.
Kim, G. H., Trimi, S., & Chung, J. H. (2014). Big-data applications in the government sector. Communications of the ACM, 57(3), 78-85.
Kshetri, N. (2014). Big data? s impact on privacy, security and consumer welfare. Telecommunications Policy, 38(11), 1134-1145.
Lu, R., Zhu, H., Liu, X., Liu, J. K., & Shao, J. (2014). Toward efficient and privacy-preserving computing in big data era. IEEE Network, 28(4), 46-50.
Mahajan, P., Gaba, G., & Chauhan, N. S. (2016). Big Data Security. IITM Journal of Management and IT, 7(1), 89-94.
Patil, H. K., & Seshadri, R. (2014, June). Big data security and privacy issues in healthcare. In Big Data (BigData Congress), 2014 IEEE International Congress on (pp. 762-765). IEEE.
Sagiroglu, S., & Sinanc, D. (2013, May). Big data: A review. In Collaboration Technologies and Systems (CTS), 2013 International Conference on (pp. 42-47). IEEE.
Thuraisingham, B. (2015, March). Big data security and privacy. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (pp. 279-280). ACM.
Vatsalan, D., Sehili, Z., Christen, P., & Rahm, E. (2017). Privacy-Preserving Record Linkage for Big Data: Current Approaches and Research Challenges. In Handbook of Big Data Technologies (pp. 851-895). Springer International Publishing.
Wu, X., Zhu, X., Wu, G. Q., & Ding, W. (2014). Data mining with big data. IEEE transactions on knowledge and data engineering, 26(1), 97-107.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download