Search results

100 items matching your search terms.
Filter the results.
Item type


































































New items since



Sort by relevance · date (newest first) · alphabetically
File PDF document ‘lifelogging’ et de la publication de données personnelles en ligne
«Consigner ou ne pas consigner ?» L’agence de cyber-sécurité ENISA a établi un rapport sur le futur impact du ‘lifelogging’ et de la publication de données personnelles en ligne, examinant leurs répercussions sur la confidentialité, l’économie, la société et la psychologie des individus
Located in News / ENISA News / PR's in FR
File Octet Stream «Να συνδέεται κανείς ή να μη συνδέεται;» Έκθεση του οργανισμού ENISA για την κυβερνοασφάλεια σχετικά με τις μελλοντικές επιπτώσεις του «Life-Logging» και των ηλεκτρονικών δεδομένων προσωπικού χαρακτήρα, καθώς και τις επιπτώσεις στο απόρρητο, την οικονομία
Ο ENISA αποπειράται να προβλέψει τις θετικές και αρνητικές επιπτώσεις, για το 2014, του ηλεκτρονικού «life-logging» (η μεταφόρτωση δεδομένων προσωπικού και άλλου χαρακτήρα στο διαδίκτυο) για τους πολίτες και την κοινωνία. Σε μια νέα έκθεση, με τίτλο «Να συνδέεται κανείς ή να μη συνδέεται; Κίνδυνοι και οφέλη από τις αναδυόμενες τεχνολογίες ‘life-logging’», ο Οργανισμός χρησιμοποιεί την καθημερινή ζωή μιας υποθετικής οικογένειας για να εξετάσει τις επιπτώσεις για το απόρρητο, το «πορτοφόλι», την ψυχολογία της οικογένειας, κτλ., καθώς τα μέλη της μεταφορτώνουν όλο και περισσότερες προσωπικές πληροφορίες στο διαδίκτυο. Στην έκθεση περιλαμβάνονται συστάσεις σχετικά με την αντιμετώπιση των κινδύνων για την ασφάλεια και το απόρρητο.
Located in News / ENISA News / PRs in Greek
Ad-Hoc Working Group on Artificial Intelligence Cybersecurity
On this page you can find the ongoing work of the Ad-hoc Working Group, supporting ENISA in the process of building knowledge on Artificial Intelligence Cybersecurity.
Located in Topics / IoT and Smart Infrastructures / Artificial Intelligence (AI)
Image Troff document AI robot
Located in Topics / IoT and Smart Infrastructures / Artificial Intelligence (AI)
Report/Study Appstore security: 5 lines of defence against malware
The booming smartphone industry has a special way of delivering software to end-users: appstores. Popular appstores have hundreds of thousands of apps for anything from online banking to mosquito repellent, and the most popular stores (Apple Appstore, Google Android market) claim billions of app downloads. But appstores have not escaped the attention of cyber attackers. Over the course of 2011 numerous malicious apps were found, across a variety of smartphone models. Using malicious apps, attackers can easily tap into the vast amount of private data processed on smartphones such as confidential business emails, location data, phone calls, SMS messages and so on. Starting from a threat model for appstores, this paper identifies five lines of defence that must be in place to address malware in appstores: app review, reputation, kill-switches, device security and jails.
Located in Publications
Report/Study Architecture model of the transport sector in Smart Cities
The main objective of this study is to model the architecture of the transport sector in SCs and to describe good cyber security practices of IPT operators. The good practices are put into a relationship with different city maturity levels. This allows representatives of operators and municipalities to quickly assess whether or not they lag behind other cities with the same maturity level in terms of cyber security and, if so, to take appropriate actions. The study is primarily focused on the provision of practical, hands-on guidance.
Located in Publications
Report/Study ECMAScript program Artificial Intelligence Cybersecurity Challenges
This report presents the Agency's active mapping of the AI cybersecurity ecosystem and its Threat Landscape, realised with the support of the Ad-Hoc Working Group on Artificial Intelligence Cybersecurity. The ENISA AI Threat Landscape not only lays the foundation for upcoming cybersecurity policy initiatives and technical guidelines, but also stresses relevant challenges. One area of particular significance is that of the supply chain related to AI and accordingly it is important to highlight the need for an EU ecosystem for secure and trustworthy AI, including all elements of the AI supply chain. The EU secure AI ecosystem should place cybersecurity and data protection at the forefront and foster relevant innovation, capacity-building, awareness raising and research and development initiatives.
Located in Publications
Report/Study Troff document Baseline Security Recommendations for IoT
The study which is titled ‘Baseline Security Recommendations for Internet of Things in the context of critical information infrastructures’, aims to set the scene for IoT security in Europe. It serves as a reference point in this field and as a foundation for relevant forthcoming initiatives and developments.
Located in Publications
Behavioural biometrics briefing launched
ENISA has launched a Briefing paper on security and authentication aspects of behavioural biometrics.
Located in News / ENISA News
Being smart about cybersecurity: ENISA at Omnisecure conference
ENISA participated at the Omnisecure conference taking place on the 16th-18th January, 2017 in Berlin. The event looks into smart ID solutions for products and services. This year’s themes focus on payments, e-Government, intelligent mobility and connected living.
Located in News / ENISA News

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information