Search results

230 items matching your search terms.
Filter the results.
Item type

New items since

Sort by relevance · date (newest first) · alphabetically
Report/Study Analysis of ICS-SCADA Cyber Security Maturity Levels in Critical Sectors
This study reveals the current maturity level of ICS-SCADA cyber security in Europe and identifies good practices used by European Member States to improve this area. The first and second part of this study introduces us to the ICS-SCADA cyber security topic, explains the role of ICS-SCADA in critical sectors and summarizes the methodology of this study. During the desk research, current activities of different Member States in the area of ICS-SCADA cyber security were also identified, including related activities, legislation status, existing cyber security strategies and the responsibility matrix of entities dedicated to improve the level of ICS-SCADA cyber security in each country.
Located in Publications
File Troff document SCADA Security Leaflet
Located in Press & Media / Audiovisual and Multimedia Gallery / Brochures and Leaflets
Is Europe ready to protect SCADA?
Located in News / ENISA News
Report/Study ECMAScript program Security and Resilience of Smart Home Environments
This study aims at securing Smart Home Environments from cyber threats by highlighting good practices that apply to every step of a product lifecycle: its development, its integration in Smart Home Environments, and its usage and maintenance until end-of-life. The study also highlights the applicability of the security measures to different types of devices. The good practices apply to manufacturers, vendors, solution providers for hardware and software, and developers. It can be used to assess their current security level, and evaluate the implementation of new security measures. European citizens, standardisation bodies, researchers and policy makers could also find an interest in this study.
Located in Publications
Report/Study Supply Chain Integrity: An overview of the ICT supply chain risks and challenges, and vision for the way forward (2015)
The root of this report is the assertion that Governments, corporations, organizations, and consumers are increasingly reliant on ICT products and services, and thus on the supply chains that deliver them. As a result of this reliance threats to supply chains have attracted more attention, including the threat of intentional tampering during development, distribution or operations, or the threat of substitution with counterfeit (including cloned or overproduced) components before or during delivery, and attacks against the economy through the supply chain. The present report identifies the nature of these threats and examines the strategies that may be used to counter them. The report was originally published in November 2012 and was updated in September 2015.
Located in Publications
Are smart infrastructures and cyber security different worlds?
Located in News / ENISA News
File PDF document eHealth project
Located in About ENISA / / March 2015 / Presentations
File PDF document ENISA Perspective on Article 19
Located in About ENISA / / March 2015 / Presentations
Press Release ENISA’s recommendations for Certifying ICS/SCADA professionals
Located in News / ENISA News
Information sharing in focus at ENISA’s 3rd Electronic Communications Reference Group Meeting
On the 29th and 30th January 2015, ENISA held in Lisbon, the 3rd Electronic Communications Reference Group meeting, with experts from telecom operators and internet service providers. The event was hosted by the Portuguese communications service provider NOS.
Located in News / ENISA News

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information