Identify strategies for combatting insider


1) Provide a brief overview of the case study

2) Prepare a diagram for the ENISA security infrastructure

3) Identify strategies for combatting Insider Threats

4) Out of the ‘'Top threats'' which threat you regard to be the most significant and why?

5) Identify and discuss the key Threat Agents. What could be done to minimize their impact on the system?

6) Provide a brief summary (literature review) of Social Hacking issues

7) Based on the data provided in Table 2, discuss the trends in threat probability

8) How could the ETL process be improved? Discuss.

9) Based on Table 10 and your own research, identify and discuss threats that (in your opinion) will be most challenging for ENISA to

combat in the year 2016 onwards.

10) To sum up, should ENISA be satisfied with its current state of IT Security? Why? Or Why not?

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: Identify strategies for combatting insider
Reference No:- TGS01124588

Now Priced at $10 (50% Discount)

Recommended (96%)

Rated (4.8/5)