Search results

249 items matching your search terms.
Filter the results.
Item type

























































New items since



Sort by relevance · date (newest first) · alphabetically
File To log or not to log? - Risks and benefits of emerging life-logging applications [Appendix I]
This is the Appendix I Scenario Building and Analysis Template, accompanying the deliverable "To log or not to log? - Risks and benefits of emerging life-logging applications".
Located in Publications / Life-logging risk assessment
Report/Study To log or not to log? - Risks and benefits of emerging life-logging applications
Located in Publications
Report/Study Cyber-bullying and online grooming: helping to protect against the risks
Children are the most valuable part of every society, regardless of culture, religion and national origin. Given the rapidly increasing digitalisation of their lives, it seemed important to assess risks related to internet usage and, in particular, the risk of become a victim of online grooming and cyber bullying activities. Today’s kids are living in an environment that is radically different from that of their parents; virtual environments are increasingly prevalent in private and education environments. This development is detrimental to their physical activities, social skills and the behavioural model that prevailed in previous generations. ENISA has formed a Working Group consisting of international experts in various disciplines related to the area of children’s online protection. Interdisciplinary knowledge and relevant experience in the area were the criteria of their engagement. During the selection phase of the scenario to be assessed, the expert group has identified cyber bullying and online grooming as an area that requires further elaboration. With this assessment we aim to demonstrate how attacks based on misuse of data (i.e. data mining and profiling) can affect minors. Although the issue of children’s exposure to internet risks has been addressed in great depth by many organisations (also during the generation of this report), we have performed this risk assessment in order to point out emerging risks and issue non-technical recommendations for their mitigation. Thus, we believe that the findings of this assessment will help in triggering further activities at various levels of society, while contributing to the necessary awareness of the online protection of minors.
Located in Publications
Closer cooperation on Data Breach Notifications between ENISA & Art. 29 Data Protection Working Party
The Agency and the Art. 29 Data Protection Working Party agreed to intensify their cooperation on Data Breach Notifications, at a meeting recently taking place in Brussels.
Located in News / ENISA News
File Octet Stream Ασφάλεια καταστημάτων εφαρμογών – πέντε γραμμές άμυνας – Νέα έκθεση από τον Οργανισμό Κυβερνοασφάλειας ENISA
Ο ENISA δημοσιεύει σήμερα μία νέα έκθεση σχετικά με την Ασφάλειατωνκαταστημάτων εφαρμογώνστην οποία τάσσεται υπέρ της υιοθέτησης μίας βασικής ομάδας 'Πέντε γραμμών άμυνας 'ενάντια στο κακόβουλο λογισμικό (malware).
Located in News / ENISA News / PRs in Greek
Press Release Octet Stream New report: App-store security– the 'five lines of defence'
The Agency today publishes a new report on app-store security where it advocates for a baseline set of ‘five lines of defence ‘ against malware.
Located in News / ENISA News
Upgraded Agency access to restricted information
The Agency has concluded an administrative agreement with the EU Commission's Security Directorate on the use of the classification ‘’RESTREINT UE/EU RESTRICTED’’. This gives the Agency formal access to these documents and ensures that it applies the basic EU principles and standards to protect EU Classified Information.
Located in News / ENISA News
Reporting data breaches - public consultation by the EU Commission
The European Commission has launched a public consultation on the procedures and formats for personal data breach notifications under the ePrivacy Directive. (2002/58/EC). This is an important development to increase the level of data security for citizens in Europe. The Agency’s role has been to develop guidelines for the technical implementation measures.
Located in News / ENISA News
Mobile malware attacks & the security of app-stores: Agency analysis
The Agency has made a brief analysis of a recent spate of malware attacks on smartphone platforms, and presents a new 'top-ten-risks' for smartphones list.
Located in News / ENISA News
eID & eGovernement: Mapping security services to authentication levels
Online tax declaration by electronic means, or smart card identification to be able to use online health care services: it all requires secure authentication. The Agency has launched a report on the authentication levels proposed by the STORK project, and their mapping to public electronic services in Europe.
Located in News / ENISA News

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information