Thursday, December 5, 2019

Agency For Network And Information Securityâ€Myassignmenthelp.Com

Question: Discuss About The Agency For Network And Information Security? Answer: Introduction The agency that gives the security that is related to the cyber space in Europes organizations is known as European Union Agency for Network and Information Security. European Union Agency for Network and Information Security is better known as ENISA. The security related to cyber space is known as Network and Information Security (NIS). The NIS security is provided by the European Union Agency for Network and Information Security (ENISA). The security of Network and Information Security is carried out that is related to develop and promote the culture of security (Silva, Rocha Guimaraes, 2016). To make Network and Information Security a level up, the European Union Agency for Network and Information Security was set up in the year 2004 in European Union. A developed process of Network and Information Security for the market to function properly European Union Agency for Network and Information Security was implied. The agency of ENISA (European Union Agency for Network and Information Security) was introduced to give advice and the related solutions to the problem. It works with the private sector as well as the members of that state in which ENISA is located (Bastl, Mare Tvrd, 2015). The planning that are made to develop the National Cyber Security is exercised by European Union Agency for Network and Information Security and also are concerned with the pan Europeans cyber security (Bartsch Frey, 2017). Cooperation and capacity that are related to CSIRT are also exercised by ENISA and also schedules in increasing the technologies which are owned by private organizations, private technologies that are coming in organizations, adoption of cloud and also to the email ids that are related to cyber threat landscape (CTL). The laws that are tied up with NIS (Network and Information Security) are promoted by European Union Agency for Network and Information Security and it also looks to develop and implement the policy of the European Union. The case study deals with the security of the threat landscape of European Union Agency for Network and Information Security which was recorded in the year 2016. There are almost fifteen types of threats are faced by the cyber sector of the Europe and all the top threats are discussed in details in the ENISA case study. All these data related to cyber attacks that were accessed was recorded in 2016 (Kleineidam et al., 2017). Concentration was given more on attacker and the vectors that attack the cyber space and their related solutions to decrease the attacks on cyber space have been discussed in the European Threat Landscape. The case study deals with all those cyber threats are the ways to solve them are elaborately given in the European Union Agency for Network and Information Security case study. The kill chain methods of all the threats are stated with diagram. There are almost five group of threat including the unintentional damage, hijacking, eavesdropping and interception, ne farious activity, legal threats and the organizational threats (Hnisch Rogge, 2017). Threats agents are discussed and their relative good practices to mitigate threats are also showcased in the given case study. The following diagram shows the European Union Agency for Network and Information Security landscape infrastructure is given below. The categorizations that are done for cyber threats for Europe are grouped mainly in five sectors. Threat group 1 includes: unintentional damage or the loss of IT assets and information or data. Threat group 2 includes: hijacking, eavesdropping and interception. Threat group 3 includes: nefarious abuse and their activities. Threat group 3 contains the legal threats and lastly threat group 4 contains threats that comes from the organization itself or may be known as the intentional threats. Unintentional damage or the loss of IT assets and Information or data: This group of threat includes erroneous or unintentional intervention, devices that are lost and sharing and leakage of data caused due to human error. The threats that are not done intentionally by the organizations or humans are known as the accidental threats. This accidental threat occurs due to clerical errors, slips that are skill based and the misconfiguration, management of poor patch, using user names that are default and the passwords that are easy to guess. The mistakes that are also based on knowledge which includes crashes and update of software, procedural flaws and integration problems are also included accidental threats (Lanfer, 2017). The Computer Associate and the other sources that provides security also announced that threats come from APIs that are insecure, social networks, photo sharing in mobile, video sharing, snapchat and may be due to data breach and also facebook. For instance, if the Big data duplicates the data records to ten times and then divides the copies to again ten nodes of storage for some of the reasons or other, the nodes may come to an end where it changes the robustness of security at different levels. And also the probability of data leak and data disclosure is also increased. This is considered as a major drawback of design of Big Data. Hijacking, Eavesdropping and Interception: The software distribution of big data is done by Hadoop, MongoDB63, Cassandra or Couchbase (Stupka, Hork Husk, 2017). All the software maintains a protocol that gives integrity and data confidentiality that are done between application communications enabled by changing the default passwords. Nefarious abuse and their activities: The information that is managed and stored in big data that are needed to access financial account and personal data such as payment, billing details and credit card details. This sector is mainly targeted by the cyber criminals. The profiling of data that are stored by big data also describes preferences, travel, habits and behavior and creates much bigger opportunity to identify the thieves (Kubicek Diederich, 2015). The generic threats that are mostly affects the components of ICT of infrastructure are exploit kits that allows malware infections and viruses, worms that allows distribution of the copies of infectious malware over the network, Trojan are small infectious malware that increases the unauthorized access of computer system, trapdoors and backdoors are the entry points that are undocumented in computer system and also service spoofing that attacks the computer system in falsifying the data and gets such advantages. Legal Threats: The data storage that comes under directive of data protection in Europe are needed to compile with the compliancy law of data security throughout the lifecycle of the data, the personal data that are kept personal for employees and the customers and the guarantee that is given for the security of the cyber threat by implementing cloud provider. Organizational Threats: The analysis of datasets that are large can undergo new signs of innovation and productivity and also unlocks the values that ate significant (Christou, 2017). The policy makers and the companies must handle the threats that are related to cyber space. Most significant Threat- The most significant group that is identified as most dangerous group of threat is the nefarious abuse and their activities (Eininger, Skopik Fiedler, 2015). The information that is managed and stored in big data that are needed to access financial account and personal data such as payment, billing details and credit card details. This sector is mainly targeted by the cyber criminals. The profiling of data that are stored by big data also describes preferences, travel, habits and behavior and creates much bigger opportunity to identify the thieves. The generic threats that are mostly affects the components of ICT of infrastructure are exploit kits that allows malware infections and viruses, worms that allows distribution of the copies of infectious malware over the network, Trojan are small infectious malware that increases the unauthorized access of computer system, trapdoors and backdoors are the entry points that are undocumented in computer system and al so service spoofing that attacks the computer system in falsifying the data and gets such advantages (Schneider, 2017). The threats coming under nefarious threats are infected code, denial of services, activities or software, unused audit tools, using duplicate certificates, unauthorized activities, authorization abuse, failure processes in business and identity fraud. Threat agents are those people who come in group or something in group that has some good capabilities and intension to cope up with the threat and also records the activities that has already occurred (Jentzsch, 2016). The threats coming from which particular groups of agent are very difficult to detect for the owners of asset of big data. The categories of threat agents of ENISA Threat Landscape (ETL) are: Corporations: Some of the enterprises and organizations use very offensive and bad tricks in their procedures. Such type of enterprises and organizations are considered as the hostile agent of threat (Bendiek, 2015). The main motives of these types of hostile agents are building advantage in competitive markets over competitors. Related with their sector and size, significant capabilities are usually possessed that ranges from intelligence of human engineering to technology especially in the sectors in which they are expert. Cyber criminals: The main objective of cyber criminals are they gain financially and their skill levels are also too high to cope up with. The nature of cyber criminals is they are hostile. The attack of cyber criminals can be of any type including national and international level. Cyber terrorists: Cyber terrorists expanded their own activities and are also engaged themselves in cyber space attacks. The main objective of cyber criminals are they gain financially and their skill levels are also too high to cope up with. The nature of cyber criminals is they are hostile (Schaumller-Bichl Kolberger, 2016). The attack of cyber criminals can be of any type including national and international level. The attacks that are done by cyber terrorists are mainly in the sector of public health, telecommunications and production. The failures of such systems cause much loss to the government and the society which helps in completion of their motive. Script kiddies: Script kiddies are the copy cats and copy the process of hacking. They mainly attack for the cause of fun (Weber, A., Weber, 2015). No such serious motive is present behind their motive of attack. Script kiddies have low motivation and their capability is very low. They are unskilled and take help of script and programs to attack the server or some system. For the purpose of hacking they mainly take help of some tools to make their attacks more serious. Online social hackers (hacktivists): The begun of hactivists mainly came in the year 2016. Their main motive is to protest some cause and also to make promotion of their cause. The hacktivists mainly attacks on problems of public health, corporations, environmental policy, military institutions and intelligence agencies. Employees: The employees group of threat agents lies in the organizations itself. The analysis of datasets that are large can undergo new signs of innovation and productivity and also unlocks the values that ate significant (Reuter, 2015). The policy makers and the companies must handle the threats that are related to cyber space. The employee threat agent consists of contractors, staffs, security guards and operational staffs of an organization they work in. Mitigate the effect of threat agents: To mitigate the effect of threat agents, threat defenders are appointed. This accidental threat that happens due to clerical errors, slips that are skill based and the misconfiguration, management of poor patch, using user names that are default and the passwords that are easy to guess can be mitigated by the defenders of threat agents (Exchange, 2016). The mistakes that are also based on knowledge which includes crashes and update of software, procedural flaws and integration problems included accidental threats can also be mitigated by the threat defenders. The Computer Associate and the other sources that provides security also finds out way to make the APIs secure and also secure the social networks, photo sharing in mobile, video sharing, and snapchat processes. To processes by which the European Threat Landscape can be improved are as follows: The resource certification (RPKI) should be utilized to give the origin of AS a validation (Catteddu Hogben, 2015). The readers should be made aware of what they are clicking to and what not to click. This decrease the possibility of hacking. Proper policy should be implemented to promote the rules of making the peering secure. Such policies are known as Appropriate Use Policy (AUP). Egress filtering should be done at the base of the router where all the signals comes into so that the traffic can be controlled at the base itself. It the control is done at the base, it can be stopped from expanding those to the systems of the users or the clients. The ETL should inform the organizations to take authorized users who know about all the mitigation processes of the threats. There is also some work of the registrants. They must keep their account details personal and they must not share with anyone. The DNS clients can be secured by deployment of DNSSEC which origins the authentication of DNS of data, data integrity and existence denial that are authenticated. Good practices for the process of routing should cover all the aspects that are related with technical staring from monitoring to filtering. The process of ETL should promote to stop the use of domain names that are taken randomly that are mainly not owned by the internal infrastructure. The top level of domains should not be considered for domain name spaces that are private. The ENISA (European Union Agency for Network and Information Security) should continue to improve the security processes that are related to the threat landscape of Europe. Operators of DNS infrastructures are responsible to develop security rules that administrators can apply to Internet infrastructure assets. However, humans are not immune to mistakes. Moreover, the effect of certain technical security rule may differ depending on the specificities of a given Internet infrastructure (Witt Freudenberg, 2016). There is a drawback in the system configuration the help in security policy. The ENISA also lacks behind the administration that are identical in only one type of group of threat that is DNS and routing. This leads to different outcomes. The gap also comes in operators of an organization. There is also a drawback in the DNS spoofing of the threat landscape. The APIs should be made more secure than that is present in the present protocol. Conclusion The security related to cyber space is known as Network and Information Security (NIS). The NIS security is provided by the European Union Agency for Network and Information Security (ENISA). The security of Network and Information Security is carried out that is related to develop and promote the culture of security. To make Network and Information Security a level up, the European Union Agency for Network and Information Security was set up in the year 2004 in European Union. A developed process of Network and Information Security for the market to function properly European Union Agency for Network and Information Security was implied. A diagram is shown in this write up that shows the infrastructure of the ENISA Landscape Threat. The case given describes all those cyber threats and the ways to solve them are elaborately given in the European Union Agency for Network and Information Security case study. The kill chain methods of all the threats are stated with diagram. There are almost five group of threat including the unintentional damage, hijacking, eavesdropping and interception, nefarious activity, legal threats and the organizational threats. Threats agents are discussed and their relative good practices to mitigate threats are also detailed in the paper. References Bartsch, M., Frey, S. (2017).State-of-the-art approaches.Incyber strategies for enterprises and authorities(pp. 55-71).Springer Specialties Wiesbaden. Bastl, M., Mare, M., Tvrd, K. (2015).Cybersecurity policy at national, European and international level: a framework analysis.Incyber security(pp. 45-67).Springer Specialties Wiesbaden. Bendiek, A. (2015, December).Digital Agenda and Cybersecurity.In theYearbook of European Integration 2015(pp. 176-181).Nomos publishing company mbH Co. KG. Catteddu, D., Hogben, G. (2015). Cloud computing.Benefits, Risks and Recommendations for Information Security/European Network and Information Security Agency, ENISA (November 2015). Christou, G. (2017).The EU's Approach to Cybersecurity. Eininger, K., Skopik, F., Fiedler, R. (2015).No cyber security without data protection.Data protection and data security,39(11), 723-729. Exchange, p. (2016).Violation of personal rights through the publication of photos on the Internet.Nomos publishing company mbH Co. KG. Hnisch, T., Rogge, S. (2017).IT security in the industry 4.0.InIndustrie 4.0(pp. 91-98).Springer Specialties Wiesbaden. Jentzsch, N. (2016).Competition policy in digital markets: Should data protection play a role?(No. 94).DIW Roundup: Policy in focus. Kleineidam, G., Schmid, LJ, Krasser, M., Koch, B. (2017).Critical infrastructure security requirements for information and communication technology from the perspective of a utility company.e i Electrical Engineering and Information Technology,134(1), 3-13. Kubicek, H., Diederich, G. (2015).Online banking in comparison.InSecurity in Online Banking(pp. 7-19).Springer Specialties Wiesbaden. Lanfer, J. (2017).Cyber-security and the (impotence) power of the state.Insecurity production between state, market and civil society(pp. 47-72).Springer Specialties Wiesbaden. Reuter, C. (2015).Operational Continuity Management in Small and Medium Business Smart Services for Industry 4.0.Mensch und Computer 2015-Workshopband. Schaumller-Bichl, I., Kolberger, A. (2016).Information Security Risk Analysis in complex systems-new challenges and solutions.InGI anniversary(pp. 609-617). Schneider, F. (2017).Reporting requirements in IT security law.Nomos publishing company mbH Co. KG. Silva, KC, Rocha, AA, Guimaraes, FQ (2016, May).Trust in the Cloud from the Sec-SLA in various models as deployment and service.InProceedings of the XII Brazilian Symposium on Information Systems on Brazilian Symposium on Information Systems: Information Systems in the Cloud Computing Era Volume 1(pp. 329-336).Brazilian Computer Society. Stupka, V., Hork, M., Husk, M. (2017, August).Protection of personal data in security alert sharing platforms.InProceedings of the 12th International Conference on Availability, Reliability and Security(p.65).ACM. Unger, WJ (2014).Cyber Defense - a national challenge.S F Security and Peace,32(1), 8-16. Weber, A., Weber, D. (2015, December).Governance of critical information technology in open networks.InResponsible Innovation(pp. 151-164).Nomos publishing company mbH Co. KG. Witt, T., Freudenberg, P. (2016).NIS policy.Computer and Law,32(10), 657.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.