Search results

34 items matching your search terms.
Filter the results.
Item type






































New items since



Sort by relevance · date (newest first) · alphabetically
Video file ECSM video clip (long version)
In a funny and innovative way citizens are reminded to pay attention before sharing private information on Internet
Located in Press & Media / Audiovisual and Multimedia Gallery / Videos
Video file ECSM video clip (short version)
In a funny and innovative way citizens are reminded to pay attention before sharing private information on Internet
Located in Press & Media / Audiovisual and Multimedia Gallery / Videos
Report/Study text/texmacs Be Aware, Be Secure. Synthesis of the results of the first European Cyber Security Month
The report provides a synthesis of the results of the European Cyber Security Month (ECSM) which took place as a pilot project across Europe throughout last October 2012. The report gives an overview of the security-related weeks organised at national level by the eight participating countries - the Czech Republic, Luxembourg, Norway, Portugal, Romania, Slovenia, Spain and the United Kingdom -; describes the role played by ENISA as coordinator of the organisation of the ECSM; and finally identifies a set of lessons learned which could be applied to future ECSMs. This publication will be available soon in e-book format.
Located in Publications
Report/Study C header European Month of Network and Information Security for All - A feasibility study (EN)
The report carries out a feasibility study containing an analysis by examining the possible implementation of a ‘European security month’ in addition to an overview of the prevailing elements of security days/weeks organised at national level across Europe. To this end, ENISA established a virtual working group.
Located in Publications
EU-U.S. event on intermediaries in cybersecurity awareness raising
The aim of the event was to get all potential intermediaries together to exchange experiences both from EU and U.S. side
Located in Events
Report/Study Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology
Located in Publications
Report/Study Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology: Annex I
This is Annex I - " Scenario Building & Analysis" of the Final Report "Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology".
Located in Publications
Report/Study Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology: Annex II
This is Annex II - "Risk Assessment Spreadsheet" of the Final Report "Flying 2.0 - Enabling automated air travel by identifying and addressing the challenges of IoT & RFID technology".
Located in Publications
Report/Study Cyber-bullying and online grooming: helping to protect against the risks
Children are the most valuable part of every society, regardless of culture, religion and national origin. Given the rapidly increasing digitalisation of their lives, it seemed important to assess risks related to internet usage and, in particular, the risk of become a victim of online grooming and cyber bullying activities. Today’s kids are living in an environment that is radically different from that of their parents; virtual environments are increasingly prevalent in private and education environments. This development is detrimental to their physical activities, social skills and the behavioural model that prevailed in previous generations. ENISA has formed a Working Group consisting of international experts in various disciplines related to the area of children’s online protection. Interdisciplinary knowledge and relevant experience in the area were the criteria of their engagement. During the selection phase of the scenario to be assessed, the expert group has identified cyber bullying and online grooming as an area that requires further elaboration. With this assessment we aim to demonstrate how attacks based on misuse of data (i.e. data mining and profiling) can affect minors. Although the issue of children’s exposure to internet risks has been addressed in great depth by many organisations (also during the generation of this report), we have performed this risk assessment in order to point out emerging risks and issue non-technical recommendations for their mitigation. Thus, we believe that the findings of this assessment will help in triggering further activities at various levels of society, while contributing to the necessary awareness of the online protection of minors.
Located in Publications
Report/Study To log or not to log? - Risks and benefits of emerging life-logging applications
Located in Publications

We use cookies to ensure we give you the best browsing experience on our website. Find out more on how we use cookies and how you can change your settings.

Ok, I understand No, tell me more