Search results

75 items matching your search terms.
Filter the results.
Item type















































New items since



Sort by relevance · date (newest first) · alphabetically
Report/Study Troff document Baseline Security Recommendations for IoT
The study which is titled ‘Baseline Security Recommendations for Internet of Things in the context of critical information infrastructures’, aims to set the scene for IoT security in Europe. It serves as a reference point in this field and as a foundation for relevant forthcoming initiatives and developments.
Located in Publications
Behavioural biometrics briefing launched
ENISA has launched a Briefing paper on security and authentication aspects of behavioural biometrics.
Located in News / ENISA News
Being smart about cybersecurity: ENISA at Omnisecure conference
ENISA participated at the Omnisecure conference taking place on the 16th-18th January, 2017 in Berlin. The event looks into smart ID solutions for products and services. This year’s themes focus on payments, e-Government, intelligent mobility and connected living.
Located in News / ENISA News
Better security measures for smartphones, ENISA has created a SMAShiNG new tool!
ENISA releases SMAShiNG – SMArtphone Secure developmeNt Guidelines – an online tool that maps security measures for smartphone guidelines. The tool supports developers to build secure mobile applications.
Located in News / ENISA News
Report/Study Cyber security and resilience for Smart Hospitals
This study proposes key recommendations for hospital information security executives and industry to enhance the level of information security in Smart Hospitals. Through the identification of assets and the related threats when IoT components are supporting a healthcare organisation the report described the Smart Hospital ecosystem and its specific objectives. Based on the analysis of documents and empirical data, and the detailed examination of attack scenarios found to be particularly relevant for smart hospitals, this document identifies mitigation techniques and good practices.”
Located in Publications
Report/Study Cyber Security and Resilience of Intelligent Public Transport. Good practices and recommendations
This study proposes a pragmatic approach that will highlight the critical assets of Intelligent Public Transport systems. It gives an overview of the existing security measures (good practices) that could be deployed to protect these critical assets and ensure security of the IPT system, based on a survey and interviews of experts from the sector, municipalities, operators, manufacturers and policy makers.
Located in Publications
Report/Study Cyber Security and Resilience of smart cars
The objective of this study is to identify good practices that ensure the security of smart cars against cyber threats, with the particularity that smart cars’ security shall also guarantee safety. The study lists the sensitive assets present in smart cars, as well as the corresponding threats, risks, mitigation factors and possible security measures to implement. To obtain this information, experts in the fields and areas related with smart cars were contacted to gather their know-how and expertise. These exchanges led to three categories of good practices: Policy and standards, Organizational measures, and Security functions.
Located in Publications
Report/Study Cyber-bullying and online grooming: helping to protect against the risks
Children are the most valuable part of every society, regardless of culture, religion and national origin. Given the rapidly increasing digitalisation of their lives, it seemed important to assess risks related to internet usage and, in particular, the risk of become a victim of online grooming and cyber bullying activities. Today’s kids are living in an environment that is radically different from that of their parents; virtual environments are increasingly prevalent in private and education environments. This development is detrimental to their physical activities, social skills and the behavioural model that prevailed in previous generations. ENISA has formed a Working Group consisting of international experts in various disciplines related to the area of children’s online protection. Interdisciplinary knowledge and relevant experience in the area were the criteria of their engagement. During the selection phase of the scenario to be assessed, the expert group has identified cyber bullying and online grooming as an area that requires further elaboration. With this assessment we aim to demonstrate how attacks based on misuse of data (i.e. data mining and profiling) can affect minors. Although the issue of children’s exposure to internet risks has been addressed in great depth by many organisations (also during the generation of this report), we have performed this risk assessment in order to point out emerging risks and issue non-technical recommendations for their mitigation. Thus, we believe that the findings of this assessment will help in triggering further activities at various levels of society, while contributing to the necessary awareness of the online protection of minors.
Located in Publications
Press Release Cybersecurity is a key enabler for Industry 4.0 adoption
ENISA today publishes a study on good practices for IoT security, with a focus on smart manufacturing and Industry 4.0.
Located in News / ENISA News
Press Release Defining and securing the Internet of Things: ENISA publishes a study on how to face cyber threats in critical information infrastructures
Today, the EU Cybersecurity Agency ENISA publishes a report on the Security of the Internet of Things (IoT).
Located in News / ENISA News

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information