The risk analysis and security is very important for the organization to implement the effective operations and integrating the flow of system development (Mahajan, Gaba & Chauhan, 2016). The development of the project would help in integrating the development of the operations and apply the effective functions within the organization. The operational processing is implied for forming the analysis of the risk that the organization might face while performing the required operations and functions. Accoding to Kao et al. (2014), the development of the risk analysis is based for the development of the operations to develop the integrated functions for the processes of the organization.
The following report would help in integrating the operations of the organization for developing risk assessment and analysis. The report would tend to evaluate the role of technology for implementing the effective risk assessment by evaluating the case study of ENISA. The practice of the big data strategy had been helpful for the improvement of operations within the organization. However, the practice of big data had formed the issues and threats of security for the organization. The analysis of the threats of the big data strategy for ENISA would discuss the agents of threat.
1.1 Overview of ENISA case study
The ENISA organization had deployed the big data analytics for forming the development of the effective operations and development in the organization (Enisa.europa.eu, 2017). ENISA has implied for developing the big data strategy in their organization. The risk and threat management should be implied for forming the effective development of improvement operations. The big data threats would result in forming the occasional threats for the organization in integration of the system within the organization. The ENISA is one of the most effective operations that could monitor the flow of operations within the organization and imply effective security system within the organization. The big data privacy is a major factor that accords the deployment of the potential development model for the ENISA (Patil & Seshadri, (2014). The operations of the organization would be highly improved by the use of the big data strategy within the organization. The organization had applied ICT based solutions for developing the security functions for their Big Data Strategy in the organization. The various owners such as data transformers, data owners, and computation and storage providers at ENISA would require effective data management and security for the information and data used at the organization. The best practices of the organization for threat and data management would involve the effective flow of operations (Vatsalan et al., (2017). The operational processing is implied for forming the analysis of the risk that the organization might face while performing the required operations and functions. The development of the risk analysis is based for the development of the operations to develop the integrated functions for the processes of the organization.
1.2 ENISA Big Data Security Infrastructure Diagram
ENISA had implied the use of the structured framework for implying the effective operations of the big data strategy. The infrastructure of the big data analytics is developed for implementing the effective processing of the information. The various layers of the big data structure include data sources, integration process, data storage, analytics and computing models, and presentation layer. The big data security infrastructure had been developed using Ms-Visio by considering the architecture of the big data strategy used in ENISA and it is shown below,
Figure 1: ENISA Big Data security infrastructure diagram
(Source: Created by the author in Ms-Visio)
ENISA had been following the layered structure for the big data implementation and integration for the information system development. The infrastructure of the big data analytics is developed for implementing the effective processing of the information. The various layers of the big data structure include data sources, integration process, data storage, analytics and computing models, and presentation layer (Patil & Seshadri, (2014). The structured big data operations in ENISA include the deployment of the effective processing of information and organizational processing. The security functions that had been added to the database diagram are KNOX, Ranger, Encryption, and Firewall. Each of the security function had been attached to the specific big data structure layer of the ENISA. The table below would show the use of the specific security function for the element of the database structure,
Name of the Security Function |
Description of the Security Function |
Specific big data structure layer of the ENISA |
Elements included in the specific big data structure layer of the ENISA |
KNOX |
KNOX provides the specific solution and real time protection of the data sources since it is added. The KNOX provides the effective control of strategies that could be implied for forming the improved control of functions in terms of security. |
Data Sources layer |
Data Sources layer includes the elements of streaming data from sensors, unstructured data, semi-structured data, and structured data. |
Ranger |
Ranger is more of an authorization system that helps in limiting the user access in the big data system as defined by the Ranger policies. The user had to request to Ranger for getting the authenticated entry into the system |
1. Integration Process layer 2. Analytics and Computing Models layer |
Integration Process layer includes the elements of ETL, Messaging, API. Analytics and Computing Models layer includes the elements of Query and Reporting, Map Reduce, Stream Analytics, and Advanced Analytics |
Encryption |
Encryption is the most secure way for protecting the data from unknown and unauthenticated source. The data would be modified by using cryptography technique so that it becomes useless for other users. |
Data Storage layer |
Data Storage layer includes the elements of No/New SQL databases, Distributed File System, and RDF stores |
Firewall |
Firewall is the best protection for the network related security issues. The wireless devices would tend to form the effective prevention of the information (from unknown sources) in the system. |
Presentation layer |
Presentation layer includes the elements of Web Browser, Desktops, Mobile Devices, and Web Services |
Table 1: Various Security functions for ENISA Big Data System
(Source: Sagiroglu & Sinanc, 2013, pp-45)
The various threats of ENISA big data strategy can be categorized into accidental threats, deliberate threats, threat of technology abuse, organization threat, and legal threats (Wu et al., 2014). These threats would result in creating hindrance for the development of the improved functions for ENISA. The following table include the threats and risk of the ENISA organization,
Threat Types |
Examples of the Risk Classification |
Accidental Threats |
Some examples of accidental threats are destruction of records, leaks of data via web application, loss of device (storage), loss of sensitive information, loss of cloud information, penetration testing damage, inadequate design and planning threat, change of data by mistake, unreliable source of information, and human errors |
Deliberate Threats |
Some examples of deliberate threats are network traffic issues, interception of the server, information interception, and radiation of interfering, replay of messages, war driving, and session hijacking of man in the middle attack. |
Threat Of Technology Abuse |
Some examples of threat of technology abuse are abuse of information leak, issues of social engineering, malicious code, abuse of authorization, brute force, business process failure, denial of service, unsolicited emails, targeted attacks, hoax, fraud and identity theft, unauthorized data breaches, misuse of audit tools, manipulation of the information, and manipulation of hardware and software. |
Organization Threat |
The organization threat include the shortage of IT skills |
Legal Threats |
Some examples of legal threats are violation of regulation, failure to meet contractual requirements, abuse of personal data, and judiciary orders. |
Table 2: Threats and Risk of the ENISA Organization
(Source: Hashem et al., 2015, pp-112)
Threat of Technology Abuse is the most critical threat when the implication of the big data analysis for the development of the effective control strategies (Kim, Trimi & Chung, 2014). The threat of technology abuse are abuse of information leak, issues of social engineering, malicious code, abuse of authorization, brute force, business process failure, denial of service, unsolicited emails, targeted attacks, hoax, fraud and identity theft, unauthorized data breaches, misuse of audit tools, manipulation of the information, and manipulation of hardware and software. The Threat of Technology Abuse is considered as the most critical threat because the development of the operations had caused the major issue in integration of the operations. The technology abuse is done for intentionally harming the organization and causing the issues in integration of the operations (Chen & Zhang, 2014). The information leak would form the major issue as the sensitive and confidential information stored in the database would be misused for personal use.
The threat of technology abuse are abuse of information leak, issues of social engineering, malicious code, abuse of authorization, brute force, business process failure, denial of service, unsolicited emails, targeted attacks, hoax, fraud and identity theft, unauthorized data breaches, misuse of audit tools, manipulation of the information, and manipulation of hardware and software. The key threat agents for the ENISA are Technology, Human Errors, Designing Errors, and Personal gain (Lu et al., 2014). These agents would involve the deployment of the issues and hindrances in the development of the operations. The involvement of the effective methods of threat detection and analysis would tend to form the extortion of the processes and development of hindrances in the organization.
Technology: The technology is the most primary factor that had formed the issues in development of the effective operations and it would form the improvement issues for the development of the systematic operational development (Thuraisingham, 2015). The technological deployment would serve the automatic processing of issues regarding the operations. The implication of the technological issues would comprise of forming the influential development of the affective flow of operations. The technological hindrances are the major factor for deployment of the simple and achievable operation development. Examples- leaks of data via web application, loss of device (storage), loss of sensitive information, loss of cloud information, penetration testing damage, and inadequate design and planning threat.
Human Errors: The human design errors are a major factor that forms the hindrances in the development of the big data analytics for organizational development. The influence of the system integrated operations would tend to implement the evaluation of the human actions and functions (Erl, Khattak & Buhler, 2016). However, the errors made by the human are cohesive for forming the issues in the development of the functions. The human made errors are responsible for the deployment of the improved functions. Examples- change of data by mistake, information interception, replay of messages, session hijacking or man in the middle attack, unauthorized data breaches, manipulation of the information, and manipulation of hardware and software.
Designing Errors: The designing errors are implied due to lack of the systematic and influential operation in the organization. The designing errors would form the implication of the operational processing (Kshetri, 2014). The designing errors are result of the implication of incorrect development model. The designing errors are developed for critically evaluating the effective and prone development of the operations. Example- business process failure, inadequate design and planning threat, change of data by mistake, and unreliable source of information
The relative solutions for the effective and improved operations for ENISA by eliminating the impact of the key threat agents are given in the table below,
Key Threat Agents |
Examples |
Impact Reduction Options |
Technology |
leaks of data via web application, loss of device (storage), loss of sensitive information, loss of cloud information, penetration testing damage, and inadequate design and planning threat |
Use of the Latest Methods of Big Data Implementation and Security Measures |
Human Errors |
change of data by mistake, information interception, replay of messages, session hijacking or man in the middle attack, unauthorized data breaches, manipulation of the information, and manipulation of hardware and software |
Use of improved IT skills for the development and usage of the IT implementation principles |
Designing Errors |
business process failure, inadequate design and planning threat, change of data by mistake, and unreliable source of information |
Using design development methodology for forming the effective flow of big data implementation |
Table 3: Mitigation Strategy for Key Threat Agents
(Source: Cardenas, Manadhata & Rajan, 2013, pp-75)
Trend in threats probability: The trend in the threats probability would be implied for forming the analysis of the threats in the organization (Chen, Mao & Liu, 2014). The trends of the threat probability would form the effective flow of the operations. The trends in probability would involve the critical deployment of the operations for the integration of the effective operations. The probability of the occurrence of the threats would involve the development of the operations for the integration of the operations in developing the effective and improved functional operations for the integration of the operations for the deployment of the effective analysis for risk assessment (Demchenko et al., 2013). The following diagram would show the probability trends of the threats with passage of time,
Figure 1: Trend in threats probability
(Source: Chen, Mao & Liu, 2014, pp-189)
ENISA had to face the performance issues due to the scaling up of the database and it would in term develop the slackness of operations for the organization (Bansal, 2014). The ETL process can be improved by the following practices in ENISA,
Utilization of minimum data: The processing of the batch would tend to exhaust a considerable amount of memory storage by pulling huge amount of data for operations in ENISA (Bansal & Kagemann, 2015). However, the extracting of the minimum (only required) data would enable the improvement of the performance of the data operations.
Avoidance of row-by-row lookup: The ETL process generally used row-by-row lookup for performing the data operations (Baumer, 2017). However, it is time consuming and slower in nature when compared to the bulk-loading. According to Guo et al. (2016), the bulk loading option of ETL would be helpful for faster processing of the large amount of data volumes in the data operations.
The IT security of ENISA had been implied for forming the development of the operations of the organization and protecting the big data structure from threats of security. The IT security is helpful for forming the protection of the existing data and information from the threats and risk factors. The key elements of the security in ENISA are KNOX, Ranger, Firewall, and Encryption. These elements have been installed at a specific layer of the big data structure for ENISA.
The current structure of the security for ENISA is very compact and it had formed the privacy of the data and information for the development of the existing facilities. KNOX, Ranger, Firewall, and Encryption have helped in protecting the specific layer of the big data structure for ENISA. However, the implementation of the IDS/IPS would help in protecting the network infiltration by detecting and preventing the access to the database of ENISA.
Conclusion
It can be concluded from the assignment that the use of big data had resulted in developing some issues and threats of information processing in the organization. The major impact on the processing of the information using big data analytics had formed the hindrance for the processes ate ENISA. The ETL process can be improved by utilization of minimum data and avoidance of row-by-row lookup. The bulk loading option of ETL had been helpful for faster processing of the large amount of data volumes in the data operations. The KNOX, Ranger, Firewall, Encryption, and IDS/IPS are helpful in protecting the network infiltration by detecting and preventing the access to the database of ENISA.
References
Bansal, S. K. (2014, June). Towards a semantic extract-transform-load (ETL) framework for big data integration. In Big Data (BigData Congress), 2014 IEEE International Congress on (pp. 522-529). IEEE.
Bansal, S. K., & Kagemann, S. (2015). Integrating big data: A semantic extract-transform-load framework. Computer, 48(3), 42-50.
Baumer, B. S. (2017). A Grammar for Reproducible and Painless Extract-Transform-Load Operations on Medium Data. arXiv preprint arXiv:1708.07073.
Cardenas, A. A., Manadhata, P. K., & Rajan, S. P. (2013). Big data analytics for security. IEEE Security & Privacy, 11(6), 74-76.
Chen, C. P., & Zhang, C. Y. (2014). Data-intensive applications, challenges, techniques and technologies: A survey on Big Data. Information Sciences, 275, 314-347.
Chen, M., Mao, S., & Liu, Y. (2014). Big data: A survey. Mobile Networks and Applications, 19(2), 171-209.
Demchenko, Y., Grosso, P., De Laat, C., & Membrey, P. (2013, May). Addressing big data issues in scientific data infrastructure. In Collaboration Technologies and Systems (CTS), 2013 International Conference on (pp. 48-55). IEEE.
Enisa.europa.eu. (2017). Big Data Threat Landscape — ENISA. [online] Available at: https://www.enisa.europa.eu/publications/bigdata-threat-landscape [Accessed 5 Sep. 2017].
Erl, T., Khattak, W., & Buhler, P. (2016). Big data fundamentals: concepts, drivers & techniques. Prentice Hall Press.
Guo, L., Wenqi, H., Xiaokai, Y., Fuzheng, Z., Chengzhi, C., & Shitao, C. (2016). Research and realization of improved extract–transform–load scheduler in China Southern Power Grid. Advances in Mechanical Engineering, 8(11), 1687814016679055.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, 98-115.
Kao, R. R., Haydon, D. T., Lycett, S. J., & Murcia, P. R. (2014). Supersize me: how whole-genome sequencing and big data are transforming epidemiology. Trends in microbiology, 22(5), 282-291.
Kim, G. H., Trimi, S., & Chung, J. H. (2014). Big-data applications in the government sector. Communications of the ACM, 57(3), 78-85.
Kshetri, N. (2014). Big data? s impact on privacy, security and consumer welfare. Telecommunications Policy, 38(11), 1134-1145.
Lu, R., Zhu, H., Liu, X., Liu, J. K., & Shao, J. (2014). Toward efficient and privacy-preserving computing in big data era. IEEE Network, 28(4), 46-50.
Mahajan, P., Gaba, G., & Chauhan, N. S. (2016). Big Data Security. IITM Journal of Management and IT, 7(1), 89-94.
Patil, H. K., & Seshadri, R. (2014, June). Big data security and privacy issues in healthcare. In Big Data (BigData Congress), 2014 IEEE International Congress on (pp. 762-765). IEEE.
Sagiroglu, S., & Sinanc, D. (2013, May). Big data: A review. In Collaboration Technologies and Systems (CTS), 2013 International Conference on (pp. 42-47). IEEE.
Thuraisingham, B. (2015, March). Big data security and privacy. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy (pp. 279-280). ACM.
Vatsalan, D., Sehili, Z., Christen, P., & Rahm, E. (2017). Privacy-Preserving Record Linkage for Big Data: Current Approaches and Research Challenges. In Handbook of Big Data Technologies (pp. 851-895). Springer International Publishing.
Wu, X., Zhu, X., Wu, G. Q., & Ding, W. (2014). Data mining with big data. IEEE transactions on knowledge and data engineering, 26(1), 97-107.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download