Tuesday, December 10, 2019

Big Data Threat Landscape Of Europe - Myassignmenthelp.Com

Questions: 1) Provide a brief overview of the case study and prepare a diagram for the ENISA Big Data security infrastructure.2) Out of the Top threats which threat would you regard to be the most significant and why?3) Identify and discuss the key Threat Agents. What could be done to minimize their impact on the system? Based on the data provided, discuss the trends in threat probability.4)How could the ETL process be improved? Discuss.5) To sum up, should ENISA be satisfied with its current state of IT Security? Why? Or Why not Answers: Answer 1: ENISA is known as the European Union for Network and Information Security. It is a centre in Europe which consists of expertise of information and network security to protect the member states, citizens of Europe and the private sector of the country.To maintain a good practice for the security of information, ENISA gives recommendations and advices to the organizations and the sectors. The work of ENISA is to improve the condition of critical network and information infrastructure of Europe and helps to implement the relevant legislation of Europe. The Europe member states are enhanced by ENISA by giving a support to the development of communities of cross border to improve the information and network security of Europe. This case study deals with the Big Data Threat Landscape of Europe. Big data are used to organize the data that are stored in the data storage of the organizations and enterprises. Big data deals with group of algorithms, system and technology that are used to collect the data that are unorganized and have a large variety. There are many sources of big data (Bartsch Frey, 2017). The data providers or the generators for big data are sensors of distributed multimedia for Internet of Things, networks and devices of mobile telecommunication, applications of web based and processes that involve distributed business. The use of big data have increased day by day which results in the improvement of the algorithms, system and technology that are associated with big data so that it can reach to a higher level of maturity and development. This case study analyses the threats of all the classes of big data asset that are identified. They are as follows: Threats that are related with big data are different from the threats that that are related to ordinary data. New type of data leakage, degradation and leakage are specific to big data are introduced for outsourcing the frequency of computation of big data and also for replicating the storage of big data. Specific data protection and privacy impacts are there for the big data (Bastl, Mare Tvrd, 2105). The links for data collection is required for parallelization in big data but the data that are additional creates data breaches and leakages. The interest that different owners of assets which include data transformers, providers for storage services, computation and data owners are different and they conflict within themselves (Bendiek, 2015). This makes the situation complex where there is a need of counter measure for security which is to be executed and planned. Simple security and privacy practice would help to decrease the security and privacy risk in the sector of big data. Securities that are stated by default principle can be highly embraced. There is also a comparative study between the counter measures that are identified for big data and the threats that are identified for big data in this case study. The drawback of present counter measure of big data and the requirements for the development of the counter measures that are needed in future are also discussed (Catteddu Hogben, 2015). The trend for present counter measures that are used to adapt the solutions that already exists against the traditional information threats in the environment of big data which mainly focuses on the amount of data is given briefly. The scalability issues are mainly satisfied by this method and does not suits the peculiarities of big data. Big data threat landscape and good practice guide gives an overall discussion about the security that are used in the security process of big data (Christou, 2017). The assets of big data, threats that are exposed to the assets, the agents of threats, risks and vulnerabilities and good practices that are emerged from the researchers in field of big data are studies in this case. The diagram that elaborates the infrastructure of big data that evolves in ENISA (European Union for Network and Information Security) is given below. Figure: ENISA Big Data Security Infrastructure Answer 2: The top threats that are identified in the landscape of big data are of categorized in five groups: Group 1- Loss of information or the damage that is done unintentionally or IT asset threat: The threats that are not caused intentionally are mainly under this category (Eininger, Skopik Fiedler, 2015). The threats that falls under this type of category are: sharing of information or leakage of information that are caused by human errors, information leakage that are caused due to web applications which are mainly caused by the APIs that are unsecured, incorrect adaptation or planning and design that are inadequate. Group 2- Hijacking, interception and eavesdropping: This threat group threat includes changing, manipulating and alteration of communications that happens between two users or parties. Installations of excess software or application tools are not needed for the victims to alter the information (Exchange, 2016). The threats that falls under this category are: information interception is most common of all the threats that are faced by big data. The inter node communications that are related to big data are considered as unsecured that uses big data tool for communicating. Group 3- Nefarious activities and abuse: The threat that comes from the nefarious activities comes under this group of threat (Hnisch Rogge, 2017). The attacker performs action to alter the victims infrastructure with the use of special tools, application or software. The threats that falls under the nefarious activities are: identity fraud, denial of services, infected code, activity or software, using rogue certificates and generations, audit tools that are misused, unauthorized activities and authorization abuse, processes that fails in business. Group 4- Legal threats: The threats of big data that comes from legal implications are that includes regulations and violation of laws, fails to meet the requirements of the contract, legislation of data breach, using intellectual property that are mainly unauthorized, misuse of data that are personal and lastly to obey the court orders and judiciary decisions (Jentzsch, 2016). The threats that are categorized under this group are: violation of regulations and laws, personal data abuse or legislation breach. Group 5- Organizational threats: The threat that comes from the organizational environment is called organizational threats (Kleineidam et al., 2017). The threat that includes in this section is skill shortage. Huge data sets helps to analyze the decrease of innovation and growth productivity of the company. This threat also helps to unlock significant values. Most significant threat- The most significant threat among all five groups of threats is the nefarious activity or abuse group (Kubicek Diederich, 2015). The threat that comes from the nefarious activities comes under this group of threat. The attacker performs action to alter the victims infrastructure with the use of special tools, application or software. The threats that falls under the nefarious activities are: identity fraud, denial of services, infected code, activity or software, using rogue certificates and generations, audit tools that are misused, unauthorized activities and authorization abuse, processes that fails in business. The attackers that target the victims send infected code or some links that to the email ids of the victims. The infected codes that are sent to the victims seem as if they are original code or links that are sent from a known authorized user. The attack hides its identity (Lanfer, 2017). When the user clicks on the links or tries to run the code on own system, the system gets affected and all the personal information and data gets transfer to the attacker and even attacker gets the control of the victims system. Sometimes, after the attack, the attacker even denies that an attack has already occurred leaving no evidence behind. This type of attack is very difficult to identify. Answer 3: Threat Agents are those who are an individual or a group of people that helps to manifest a threat. It is difficult to detect for the victims that from which agent the threats have actually arrived. Threats Agents are: Corporations: The organizations or enterprises that are engaged with tactics or systems those are offensive (Reuter, 2015). In this type of threat agent, the corporations are known as the agents of hostile threat. The main motive of the corporations is to make advantages that are related to competition over the competitors. Cyber Criminals: Cyber criminals are hostile naturally. The main motive of cyber criminals is to gain financially and level of skills of cyber criminals are quite high. All the levels including local, international and national levels are organized by cyber criminals. Cyber Terrorists: The activities of cyber terrorists are expanded and are engaged in cyber attack. The motivation of cyber terrorists can be both as religious and political (Schaumller-Bichl Kolberger, 2106). The capabilities of this threat agent differ from high to low. The critical infrastructures are mainly targeted by the cyber terrorist that includes telecommunications, energy production and public health. Hacktivists: These agents are mainly individuals that take the help of the computer system to promote and protest their cause of hacking. The targets of hackers of online social media are high profile websites, intelligence agencies, military institutions and corporations. Script Kiddies: Script Kiddies are agents that use the process of cyber attack just for fun. Their intention is not to harm other but to just hack for fun. They are usually unskilled who uses programs and scripts to attack networks and computer systems or the servers. Employees: Employees include contractors, organizational staffs and even the security guards of the company (Schneider, 2017). The resource of the company is accessed by the insider employees of the company. Employees are both hostile and non hostile agents of a company. They have some amount of knowledge that helps to attack the assets of their company. Nation States: Nation States have cyber capabilities that are offensive and use these capabilities against adversary. Due to deployment of attacks that are sophisticated, nation state agents have become prominent. These are also known as cyber weapons. Minimize the impact of Threat agents: To minimize the impact of threat agents, certain mitigation processes are used. One of the main processes to mitigate the impact of threat agents is the process of cryptography. The cryptography process is used to prevent the access of unauthorized user and unintentional leakage of data that are sensitive and also the systems. The impact of agents that are related to threats can also be minimized by using secured APIs, planning or designing inadequately, adaptation of improper software. Using processing platforms that are trustworthy are also recommended to mitigate the impact of threat agents (Silva, Rocha Guimaraes, 2016). The big data should be hosted with the ISP or the cloud provider should also be implemented to prevent attacks to cyber space. All the infrastructure should be kept safe by the manufacturers so that the insider threats may not affect the companys infrastructure. Strong hashing function should be implemented in the cloud structure instead of collision and weak pr one hashing algorithm. Answer 4: The European Threat Landscape can be improved by the following ways: If stored processes are used In ETL processing, then a copy of all the input parameters are to be stored in internal variables. The server of SQL often faces parameter sniffing when it exhibits plan of query execution. The number of joins and CTEs are to be limited while working with a single query. The query optimizer starts to choose plans that are sub optimal in SQL server. The update option of auto statistics of the database that is been used should be checked and turned on. The database should always be kept updated. A step should be attached at the end of all the jobs so that the indexes are rebuilt of the reporting tables. The indexes are kept sure using this process. Parallel thread should be utilized to check the ETL logic scheduling (Stupka, Hork Husk, 2017) It is not suggested to all the code at the same time if the codes are not connected to each other. This helps to save time. The ETL code should not be operated with cursor. Cursors should not be used in any ETL processes that are scheduled regularly. The European Threat Landscape should be planned for long term so that it does not get expires in short period of time. The process of ETL should be kept updated along with the updated threats because the agents of threats keep on improving itself with time (Unger, 2014). New attacks are invented with every new attack that is carried out. So to cope with those, the defenders of the attack should be kept updated Answer 5: The current state of ENISA security provides a very good security to the organizations. To maintain a good practice for the security of information, ENISA gives recommendations and advices to the organizations and the sectors. The work of ENISA is to improve the condition of critical network and information infrastructure of Europe and helps to implement the relevant legislation of Europe (Weber Weber, 2015). The Europe member states are enhanced by ENISA by giving a support to the development of communities of cross border to improve the information and network security of Europe. To minimize the impact of threat agents, certain mitigation processes are used. One of the main processes to mitigate the impact of threat agents is to improve the process of cryptography. The cryptography process is used to prevent the access of unauthorized user and unintentional leakage of data that are sensitive and also the systems. The impact of agents that are related to threats can also be minimiz ed by using secured APIs, planning or designing inadequately, adaptation of improper software. Using processing platforms that are trustworthy are also recommended to mitigate the impact of threat agents. The big data should be hosted with the ISP or the cloud provider should also be implemented to prevent attacks to cyber space. The entire infrastructure should be kept safe by the manufacturers so that the insider threats may not affect the companys infrastructure. Strong hashing function should be implemented in the cloud structure instead of collision and weak prone hashing algorithm (Witt Freudenberg, 2016). The mobile internet should be kept secured which has increased to 44 percent of the total incidents that were reported. Because of the technical failures and system failures 70 percent of the attack occurs. The root cause of the cyber attacks are because of technical failures and system failures. The attacks happen mainly because of stations based on mobile and routers and switches. Human errors are also one of the main causes in making the ENISA not a successful one. Almost accounting 2.6 million connection of user are affected to cyber attack due to human error. References Bartsch, M., Frey, S. (2017).State-of-the-art approaches.Incyber strategies for enterprises and authorities(pp. 55-71).Springer Specialties Wiesbaden. Bastl, M., Mare, M., Tvrd, K. (2015).Cybersecurity policy at national, European and international level: a framework analysis.Incyber security(pp. 45-67).Springer Specialties Wiesbaden. Bendiek, A. (2015, December).Digital Agenda and Cybersecurity.In theYearbook of European Integration 2015(pp. 176-181).Nomos publishing company mbH Co. KG. Catteddu, D., Hogben, G. (2015). Cloud computing.Benefits, Risks and Recommendations for Information Security/European Network and Information Security Agency, ENISA (November 2015). Christou, G. (2017).The EU's Approach to Cybersecurity. Eininger, K., Skopik, F., Fiedler, R. (2015).No cyber security without data protection.Data protection and data security,39(11), 723-729. Exchange, p. (2016).Violation of personal rights through the publication of photos on the Internet.Nomos publishing company mbH Co. KG. Hnisch, T., Rogge, S. (2017).IT security in the industry 4.0.InIndustrie 4.0(pp. 91-98).Springer Specialties Wiesbaden. Jentzsch, N. (2016).Competition policy in digital markets: Should data protection play a role?(No. 94).DIW Roundup: Policy in focus. Kleineidam, G., Schmid, LJ, Krasser, M., Koch, B. (2017).Critical infrastructure security requirements for information and communication technology from the perspective of a utility company.e i Electrical Engineering and Information Technology,134(1), 3-13. Kubicek, H., Diederich, G. (2015).Online banking in comparison.InSecurity in Online Banking(pp. 7-19).Springer Specialties Wiesbaden. Lanfer, J. (2017).Cyber-security and the (impotence) power of the state.Insecurity production between state, market and civil society(pp. 47-72).Springer Specialties Wiesbaden. Reuter, C. (2015).Operational Continuity Management in Small and Medium Business Smart Services for Industry 4.0.Mensch und Computer 2015-Workshopband. Schaumller-Bichl, I., Kolberger, A. (2016).Information Security Risk Analysis in complex systems-new challenges and solutions.InGI anniversary(pp. 609-617). Schneider, F. (2017).Reporting requirements in IT security law.Nomos publishing company mbH Co. KG. Silva, KC, Rocha, AA, Guimaraes, FQ (2016, May).Trust in the Cloud from the Sec-SLA in various models as deployment and service.InProceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era Volume 1(pp. 329-336).Brazilian Computer Society. Stupka, V., Hork, M., Husk, M. (2017, August).Protection of personal data in security alert sharing platforms.InProceedings of the 12th International Conference on Availability, Reliability and Security(p.65).ACM. Unger, WJ (2014).Cyber Defense - a national challenge.S F Security and Peace,32(1), 8-16. Weber, A., Weber, D. (2015, December).Governance of critical information technology in open networks.InResponsible Innovation(pp. 151-164).Nomos publishing company mbH Co. KG. Witt, T., Freudenberg, P. (2016).NIS policy.Computer and Law,32(10), 657.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.