Please use the following URL to download

Task Consider the following Case study. Please use the following URL to download and read the ENISA Big Data Threat Landscape 2016 document. And answer the following Questions: (5 marks each) 1) Provide a brief overview of the case study and prepare a diagram for the ENISA Big Data security infrastructure. 2) Out of the ‘’Top threats’’ which threat would you regard to be the most significant and why? 3) Identify and discuss the key Threat Agents. What could be done to minimize their impact on the system? Based on the data provided, discuss the trends in threat probability. 4) How could the ETL process be improved? Discuss. 5) To sum up, should ENISA be satisfied with its current state of IT Security? Why? Or Why not? Rationale This assignment is for students to meet the following learning outcomes. be able to justify the goals and various key terms used in risk management and assess IT risk in business terms; be able to critically analyse the various approaches for mitigating security risk, including when to use insurance to transfer IT risk; be able to critically evaluate IT security risks in terms of vulnerabilities targeted by hackers and the benefits of using intrusion detection systems, firewalls and vulnerability scanners to reduce risk.

Our writing company helps you enjoy campus life. We have committed and experienced tutors and academic writers who have a keen eye in writing papers related to Business, Management, Marketing, History, English, Media studies, Literature, nursing, Finance, Medicine, Archaeology, Accounting, Statistics, Technology, Arts, Religion, Economics, Law, Psychology, Biology, Philosophy, Sociology, Political science, Mathematics, Engineering, Ecology etc.

Need Custom Written Paper?

-Plagiarism free

-Timely delivery