Search results

229 items matching your search terms.
Filter the results.
Item type

New items since

Sort by relevance · date (newest first) · alphabetically
Press Release ECMAScript program EU Agency ENISA issues final report & video clip on 'Cyber Europe 2010': the 1st pan- European cyber security exercise
EU Agency ENISA issues final report and video clip on Cyber Europe 2010: the 1st pan- European cyber security exercise for public bodies. The European Union’s cyber security agency, ENISA has issued the final report on the first Pan-European cyber security exercise for public bodies, ‘Cyber Europe 2010’.
Located in News / ENISA News
Press Release The Internet Interconnection ‘ecosystem’ - new report identifies top risks for resilient interconnection of IT networks
The Internet Interconnection ‘ecosystem’ - EU Agency ENISA's new report identifies the top risks for resilient interconnection of IT networks.
Located in News / ENISA News
File Octet Stream Agenda
Located in Events / NBU/ENISA workshop on the NIS Directive and Critical Information Infrastructure Protection
Report/Study C header Technologies with potential to improve the resilience of the Internet infrastructure
In 2011 ENISA performed the review of its studies on resilient technologies from 2008-2010, complementing the findings of the previous years and investigating the deployment status of technologies enhancing resilience. Initial review of supply chain integrity assuring methods was also investigated.
Located in Publications
Report/Study Supply Chain Integrity: An overview of the ICT supply chain risks and challenges, and vision for the way forward (2015)
The root of this report is the assertion that Governments, corporations, organizations, and consumers are increasingly reliant on ICT products and services, and thus on the supply chains that deliver them. As a result of this reliance threats to supply chains have attracted more attention, including the threat of intentional tampering during development, distribution or operations, or the threat of substitution with counterfeit (including cloned or overproduced) components before or during delivery, and attacks against the economy through the supply chain. The present report identifies the nature of these threats and examines the strategies that may be used to counter them. The report was originally published in November 2012 and was updated in September 2015.
Located in Publications
Report/Study Power Sector Dependency on Time Service: attacks against time sensitive services
This publication describes the threats against energy providers’ services which depend on the availability of precise timing and communication networks. It provides a typical architecture which supports the time measurement service. Then it describes the threats as well as the attacks against the CIA (confidentiality, integrity, availability) of the service and it provides a set of mitigation measures. Finally, it concludes with some recommendations to technology vendors and energy operators.
Located in Publications
ENISA Video File Pascal source code 'Cyber Europe 2010'-video clip
Cyber Europe 2010-video clip of the first pan-European cyber security exercise for public bodies.
Located in Press & Media / Audiovisual and Multimedia Gallery / Videos
ENISA Video File object code Resilience Metrics video
Business and governments are all reliant on secure networks. But how do you measure the resilience of these networks? Metrics and a measurement framework are essential to the improve network and service resilience. ENISA's video clip on this is supporting its new, first in-depth reports on metrics in Europe.
Located in Press & Media / Audiovisual and Multimedia Gallery / Videos
ENISA Video File object code Metrics Video
Located in Topics / / Internet Infrastructure / Resilience Metrics
Procurement ECMAScript program Auditing Incident Reporting Framework and Cyber Security Strategies - (3 Lots)
Located in Public Procurement

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information