Limited Time OfferFLAT 20% off & $20 bonus sign up. Order Now
New! Hire Essay Assignment Writer Online and Get Flat 20% Discount!!Order Now
There is an elaboration of threats which is related to the Big Data in the case study. There have been much gained traction within last few years and thus the data storage and information technology has been anticipated to play a serious role on several new aspects in the society (Marinos, 2013). The potential impact of the Big Data has been acknowledged by the European Commission by identifying the strategic approach in the Big Data. The aspects that can be developed and affected by the development of information technology and big data are food security, health security, climate and resources that are efficient to energy, intelligent transport system and smart cities. The data is thus conceivable to the economic drive in the organizational system. In the field of science and research there is also a large impact of the Big Data that continues to escalate.
Thus, many agencies and institution all over the globe are planning to launch the Big Data projects for better exploitation of data analysis and cloud computing. Technologies of Big Data can also be used in the application of military field, such as combat accommodating or fighting virtual or real terrorism. Thus identifying and collecting the information from heterogeneous sources from any real filed or open sources has a great impact (Marinos, Belmonte &Rekleitis, 2014). High tech and highly novel ICT systems are used in the approach of Big Data. But increase in the use of this Big Data technology has also frequently increased the chances of cyber attacks, data breaches and hacking.
The increases of this kind of challenges are both trending the number in sophisticated and impact. By increase in the number of usability of business in Big Data and organizations, the attackers get incentives for developing and specializes attacks against Big Data analysis. This technology are used by tools that has also the capability that combats the cyber threats that offers privacy and security professionals that has valuable insights in incident management and threats. In the area of Big Data analysis ENISA delivers the area of this Threats Landscapes by the inputs from the ENISA Threat Landscape activities. The case study discusses about the architecture, ENISA threat taxonomy the targeted audience of Big Data approach, the asset taxonomy of Big Data, the methodology by which the case study has been carried out, gaps of the study and finally recommending the approach.
The infrastructure layer in ENISA by Big Data is depicted by the Cloud Computing. IT helps in meeting the infrastructure requirement like the elasticity, cost-effectiveness and the ability to scale up and down. The security infrastructure of Big Data system in ENISA follows:
Out of the ‘’Top threats’’ which threat would you regard to be the most significant and why?
The different kinds of threats according to the group are:
According the comparison of the three threats groups the most significant threat is the “Eavesdropping, Interception and Hijacking”, since the most data and privacy risks are related to this threat faces maximum difficulties, like the data braches, hacking, cyber attack and many more. Affecting the most private and confidential resources of the company (Cho et al., 2016). This threat agent is hostile in nature. Their goal is basically financial gain having higher skill level. Cybercriminals can be organized on a local, national or even international level.
These agents are socially and politically motivated individuals using the network or the computer system for protesting and promoting causes of the damage (Wang, Anokhin & Anderl, 2017). The main attacks by this threat groups are Leakage of Information /sharing because of human fault, Leaks of information via applications of web (unsecure APIs), designing inadequately and planning, or wrong adaptation and Interception of information. The contribution of smart devices and computer platform from the unprecedented networking to the Big Data may pose privacy concern where an individual’s location, transaction and other behavior are digitally recorded (Scott et al., 2016). High profile websites are generally being targeted along with intelligence agencies and military institutions.
According the ENISA threat Landscape, the threat agent is described as “someone or something with decent capabilities, a clear intention to manifest a threat and a record of past activities in this regard” (Barnard-Wills, Marinos&Portesi, 2014). The organization using Big Data application has to be aware of the threats that are emerging and from which threat groups that they belong. There are categories by which the threat agents have been divided in:
Corporations: This category refers to the enterprises or organizations that may engage or adapt any tactics that may be unethical and offensive to the enterprise. These are the hostile threat agents having the motive to build competitive advantage over the competitors. The organization generally sorts their main targets and focusing over the size and sectors the enterprises possess capabilities to the area of significance, as well as from the area of technological aspect to human engineering intelligence in the field of expertise (Brender& Markov, 2013).
Cyber Criminals: This threat agent is hostile in nature. Their goal is basically financial gain having higher skill level (Le Bray, Mayer &Aubert, 2016). Cybercriminals can be organized on a local, national or even international level
Cyber terrorists: The motivation of this threat agent can either be religious or political, that expands the activity engaging in cyber-attacks. The targets that are preferred by the cyber terrorists are mainly over critical infrastructure like in telecommunication, energy production or public healthcare system (Olesen, 2016). This complex infrastructure is generally chosen since failure of this organization creates as chaos and cause severe impact in the government and society.
Script kiddies: These agents use the scripts and the programs developed since these are mainly unskilled, that attacks the network or the computer systems as well as websites.
Online social hackers (hacktivists): These agents are socially and politically motivated individuals using the network or the computer system for protesting and promoting causes of the damage (Bugeja, Jacobsson&Davidsson, 2017). High profile websites are generally being targeted along with intelligence agencies and military institutions.
Employees: Sometime the employees for the deterioration of the company access the company’s resources from inside and hence hostile and non-hostile agents both of these can considered to the employee. This agent includes staffs, operational staffs, contractors or security guards of the company (Belmonte Martin et al., 2015). A significant amount of knowledge is required for this kind of threats, which helps them in placing the effective attack against the assets of the company.
Nation states: these agents usually have offensive capabilities in cyber security and may use it over an enterprise.
Protecting the Big Data assets by using applicable methods and techniques in the organization. There has been a shared responsibility for the privacy, security and infrastructure management of every organization. Since, the agents target the main stakeholders of the Big Data focusing on the large amount of datasets (Belmonte Martin et al., 2015). After a careful evolution of the life cycle of Big Data there should be aim of verifying and proving the correct behavior. There can be success in vendors committed by the third party, applying security measures and hence stay updated and focused.
The threats taxonomy as developed by the ENISA Threat Landscape (ETL) Group and this includes threats that are applicable for the assets of the Big Data and these can be improves by the following ways:
As per the ENISA Big Data there are few points on the security infrastructure:
There are several kinds of challenges identifies in the security system of Big Data. These challenges must need data protection, control accessibility of data and data filtering (Lykou, 2016). As said by the ENISA there are several issues regarding huge amount of data control that is beyond the processing power of products in Security information and Event Management (SIEM).
Yes, ENISA be satisfied with its current state of IT Security. There are gaps in data protection due to the threats and confidentiality of sensor data streams. In cases of identity fraud the traffic captured and the Big Data analysis helps in facilitating the privacy intrusion by strengthening the common techniques and on further research in the required fields. In year 2009 the ENISA has decided to update and assess the risks and benefits for higher reflection to the current situation of the organization. It has been detected that the main risk that is by using cloud computing has not changed but there has been a decision of reconstructing the risks having the aim of making the descriptions much uniform (Lévy-Bencheton et al., 2015). There has been an introduction of legal and data protection aspects of Big Data and cloud computing. There is a continuation of monitoring the development related to the threats and risk of cloud computing and accordingly update the Risk Assessment.
Barnard-Wills, D. (2014). ENISA Threat Landscape and Good Practice Guide for Smart Home and Converged Media. ENISA (The European Network and Information Security Agency).
Barnard-Wills, D., Marinos, L., &Portesi, S. (2014). Threat landscape and good practice guide for smart home and converged media. European Union Agency for Network and Information Security, ENISA.
Belmonte Martin, A., Marinos, L., Rekleitis, E., Spanoudakis, G., &Petroulakis, N. E. (2015). Threat Landscape and Good Practice Guide for Software Defined Networks/5G.
Brender, N., & Markov, I. (2013). Risk perception and risk management in cloud computing: Results from a case study of Swiss companies. International journal of information management, 33(5), 726-733.
Bugeja, J., Jacobsson, A., &Davidsson, P. (2017, March). An analysis of malicious threat agents for the smart connected home. In Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on (pp. 557-562). IEEE.
Cho, H., Yoon, K., Choi, S., & Kim, Y. M. (2016). Automatic Binary Execution Environment based on Real-machines for Intelligent Malware Analysis. KIISE Transactions on Computing Practices, 22(3), 139-144.
Gorton, D. (2015). IncidentResponseSim: An agent-based simulation tool for risk management of online Fraud. In Secure IT Systems (pp. 172-187). Springer, Cham.
Karchefsky, S., & Rao, H. R. (2017). Toward a Safer Tomorrow: Cybersecurity and Critical Infrastructure. In The Palgrave Handbook of Managing Continuous Business Transformation (pp. 335-352). Palgrave Macmillan UK.
Le Bray, Y., Mayer, N., &Aubert, J. (2016, April). Defining measurements for analyzing information security risk reports in the telecommunications sector. In Proceedings of the 31st Annual ACM Symposium on Applied Computing(pp. 2189-2194). ACM.
Lehto, M. (2015). Phenomena in the Cyber World. In Cyber Security: Analytics, Technology and Automation (pp. 3-29). Springer International Publishing.
Lévy-Bencheton, C., Marinos, L., Mattioli, R., King, T., Dietzel, C., &Stumpf, J. (2015). Threat landscape and good practice guide for internet infrastructure. Report, European Union Agency for Network and Information Security (ENISA).
Lévy-Bencheton, C., Marinos, L., Mattioli, R., King, T., Dietzel, C., &Stumpf, J. (2015). Threat landscape and good practice guide for internet infrastructure. Report, European Union Agency for Network and Information Security (ENISA).
Lykou, G. (2016). Critical Infrastructure Protection: Protecting Public Welfare.
Marinos, L. (2013). ENISA Threat Landscape 2013: Overview of current and emerging cyber-threats. Heraklion: European Union Agency for Network and Information Security Publishing. doi, 10, 14231.
Marinos, L., Belmonte, A., &Rekleitis, E. (2014). ENISA Threat Landscape Report 2013. European Union Agency for Network and Information Security.
Marinos, L., Belmonte, A., &Rekleitis, E. (2014). ENISA Threat Landscape 2015. Heraklion, Greece: ENISA. doi, 10, 061861.
Olesen, N. (2016). European Public-Private Partnerships on Cybersecurity-An Instrument to Support the Fight Against Cybercrime and Cyberterrorism. In Combatting Cybercrime and Cyberterrorism (pp. 259-278). Springer International Publishing.
Rhee, K., Won, D., Jang, S. W., Chae, S., & Park, S. (2013). Threat modeling of a mobile device management system for secure smart work. Electronic Commerce Research, 13(3), 243-256.
Scott, K. (2016, November). Phobic Cartography: a Human-Centred, Communicative Analysis of the Cyber Threat Landscape.
Wang, Y., Anokhin, O., &Anderl, R. (2017). Concept and use Case Driven Approach for Mapping IT Security Requirements on System Assets and Processes in Industrie 4.0. Procedia CIRP, 63, 207-212.
No matter how close the deadline is, you will find quick solutions for your urgent assignments.
All assessments are written by experts based on research and credible sources. It also quality-approved by editors and proofreaders.
Our team consists of writers and PhD scholars with profound knowledge in their subject of study and deliver A+ quality solution.
We offer academic help services for a wide array of subjects.
We care about our students and guarantee the best price in the market to help them avail top academic services that fit any budget.
15,000+ happy customers and counting!