-
Life-logging risk assessment
-
"To log or not to log?" Risks and benefits of emerging life-logging applications
Located in
Publications
-
To log or not to log? - Risks and benefits of emerging life-logging applications [Appendix II]
-
This is the Appendix II Risk Assessment Spreadsheet, accompanying the deliverable "To log or not to log? - Risks and benefits of emerging life-logging applications"
Located in
Publications
/
Life-logging risk assessment
-
To log or not to log? - Risks and benefits of emerging life-logging applications [Appendix I]
-
This is the Appendix I Scenario Building and Analysis Template, accompanying the deliverable "To log or not to log? - Risks and benefits of emerging life-logging applications".
Located in
Publications
/
Life-logging risk assessment
-
To log or not to log? - Risks and benefits of emerging life-logging applications
-
Located in
Publications
-
Ασφάλεια καταστημάτων εφαρμογών – πέντε γραμμές άμυνας – Νέα έκθεση από τον Οργανισμό Κυβερνοασφάλειας ENISA
-
Ο ENISA δημοσιεύει σήμερα μία νέα έκθεση σχετικά με την Ασφάλειατωνκαταστημάτων εφαρμογώνστην οποία τάσσεται υπέρ της υιοθέτησης μίας βασικής ομάδας 'Πέντε γραμμών άμυνας 'ενάντια στο κακόβουλο λογισμικό (malware).
Located in
News
/
ENISA News
/
PRs in Greek
-
New report: App-store security– the 'five lines of defence'
-
The Agency today publishes a new report on app-store security where it advocates for a baseline set of ‘five lines of defence ‘ against malware.
Located in
News
/
ENISA News
-
Mobile malware attacks & the security of app-stores: Agency analysis
-
The Agency has made a brief analysis of a recent spate of malware attacks on smartphone platforms, and presents a new 'top-ten-risks' for smartphones list.
Located in
News
/
ENISA News
-
Privacy, Accountability and Trust – Challenges and Opportunities
-
In the study, we focus on some of the available technologies and research results addressing privacy and data protection and topics related to, or influencing privacy, such as consent, accountability, trust, tracking and profiling. The objective is to provide a comprehensive and realistic view of both limitations generated and possibilities provided by technologies in the case of personal data protection rights.
Located in
Publications
-
Survey of accountability, trust, consent, tracking, security and privacy mechanisms in online environments
-
The study, using a survey, attempts to evaluate which are currently the mechanisms deployed in available online services for accountability, consent, trust, security and privacy. While the finding of this survey cannot be easily extrapolated to all online services, some trends are prominent and it is safe to assume that these are valid for most organisations that operate online. Besides these trends, we mention here the lack of a single coherent view on how to best achieve user privacy in online environments. An increase in awareness of privacy and security concepts within organisations and industry sectors appears to be desirable, in order to maintain a high level of security and confidence on the part of users and society in the ICT infrastructure and services provided within the EU. A major area of concern was how the EU would create and maintain a ‘level regulatory playing field’, especially with non-EU based multinationals entering the EU market without proper (privacy) compliance and rapidly establishing a significant user base.
Located in
Publications
-
Data breach notifications in the EU
-
The introduction of a European data breach notification requirement for the electronic communication sector introduced in the review of the ePrivacy Directive (2002/58/EC) is an important development with a potential to increase the level of data security in Europe and foster reassurance amongst citizens on how their personal data is being secured and protected by electronic communication sector operators. Against this background, ENISA reviewed the current situation in order to develop a consistent set of guidelines addressing the technical implementation measures and the procedures, as described by Article 4 of the reviewed Directive 2002/58/EC.
Located in
Publications