-
Security and Resilience in eHealth Infrastructures and Services
-
The aim of this study is to investigate the approaches and measures MS take to protect critical healthcare systems, having as a main goal improved healthcare ...
Located in
Publications
-
Stocktaking, Analysis and Recommendations on the protection of CIIs
-
This study takes stock of and analyses the different approaches the EU Member States take to protect their critical information infrastructures by presenting ...
Located in
Publications
-
Incentives and barriers of the cyber insurance market in Europe
-
ENISA conducted a study identifying possible causes inhibiting the cyber-insurance market in Europe and investigating incentives to kick –start its ...
Located in
Publications
-
EP3R 2013 – Task Forces on Terminology Definitions and Categorisation of Assets (TF-TDCA)
-
This Position Paper intends to establish the foundations of a commonly accepted and adopted methodology to define proper Terminology within EP3R, and later ...
Located in
Publications
-
Position Paper of the EP3R Task Forces on Incident Management and Mutual Aid Strategies (TF-MASIM)
-
This document summarises the discussions that happened between April and September 2013 in the EP3R Task Force on Incident Management and Mutual Aid ...
Located in
Publications
-
Position Paper of the EP3R Task Forces on Trusted Information Sharing (TF-TIS)
-
The key recommendations of this report are: - To establish a pilot based on the Management and Functional Requirements listed in this document which usage will ...
Located in
Publications
-
Cyber Security and Resilience of Intelligent Public Transport. Good practices and recommendations
-
This study proposes a pragmatic approach that will highlight the critical assets of Intelligent Public Transport systems. It gives an overview of the existing ...
Located in
Publications
-
Architecture model of the transport sector in Smart Cities
-
The main objective of this study is to model the architecture of the transport sector in SCs and to describe good cyber security practices of IPT operators. ...
Located in
Publications