Search results

103 items matching your search terms.
Filter the results.
Item type


















































New items since



Sort by relevance · date (newest first) · alphabetically
Report/Study Threat Landscape and Good Practice Guide for Software Defined Networks/5G
This study reviews threats and potential compromises related to the security of SDN/5G networks. More specifically, this report has identified related network assets and the security threats, challenges and risks arising for these assets. Driven by the identified threats and risks, existing security mechanism and and good practices for SDN/5G/NFV has been identified. Finally based in the collated information technical, policy and organizational recommendations for proactively enhancing the security of SDN/5G is provided.
Located in Publications
Report/Study Threat Landscape for Smart Home and Media Convergence
The study identifies threats to all asset classes, across the several alternative design pathways to smart homes. As it develops, the smart home will exhibit a high cyber security risk profile for the individual context, with additional systematic effects on broader information security.
Located in Publications
Report/Study Threat Landscape of Internet Infrastructure
This study details a list of good practices that aim at securing an Internet infrastructure asset from Important Specific Threats. A gap analysis identifies that some assets remain not covered by current good practices: human resources (administrators and operators) for Routing, DNS and Denial of Service, as well as System Configuration and Essential Addressing Protocols for Denial of Service.
Located in Publications
Threat Landscape of Internet Infrastructure
Located in Topics / / Threat Landscape / ENISA Thematic Landscapes
Threat Landscape of Internet Infrastructure
Located in Topics / / Threat Landscape / ENISA Thematic Landscapes
File Pascal source code Threat Mind Map
Located in Topics / / ENISA Thematic Landscapes / Threat Landscape of Internet Infrastructure
File Threat Taxonomy
Latest version of ENISA's Threat Taxonomy. Updated in September 2016.
Located in Topics / / Threat Landscape / ENISA Threat Landscape
Udo Helmbrecht discusses cyber cooperation at New York Summit
Located in News / ENISA News
File ECMAScript program Une action urgente est nécessaire pour lutter contre les tendances émergentes de cyber-attaques
L'Agence Européenne chargée de la sécurité des réseaux et de l'information, l’ENISA, a émis aujourd'hui une note d’information urgente : « Les cyber-attaques, une nouvelle vie pour de vieilles armes » qui analyse et suit les récentes cyber-attaques.
Located in News / ENISA News / PR's in FR
Press Release Urgent action is needed in order to combat emerging cyber-attack trends
EU cyber security agency, ENISA, has today issued an information Flash Note, ‘Cyber attacks – a new edge for old weapons’ that analyses and tracks recent cyber attacks.
Located in News / ENISA News

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information