Consider the following Case study. Please use the following URL to download and read the ENISA Threat Landscape 2014 document.And answer the following Questions: (2.5 marks each)1) Provide a brief overview of the case study.2) Prepare a diagram for the ENISA security infrastructure.3) Identify strategies for combatting Insider Threats.4) Out of the ‘’Top threats’’ which threat would you regard to be the most significant and why?5) Identify and discuss the key Threat Agents. What could be done to minimize their impact on the system?6) Provide a brief summary (literature review) of Social Hacking issues.7) Based on the data provided in Table 2, discuss the trends in threat probability.8) How could the ETL process be improved? Discuss.9) Based on Table 10 and your own research, identify and discuss threats that (in your opinion) will be most challenging for ENISA to combat in the year 2016 onwards.10) To sum up, should ENISA be satisfied with its current state of IT Security? Why? Or Why not?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here