Search results

288 items matching your search terms.
Filter the results.
Item type








































New items since



Sort by relevance · date (newest first) · alphabetically
Press Release Legacy technologies as a threat to EU’s telecommunications infrastructure
EU level assessment of the current sets of protocols used in interconnections in telecommunications (SS7, Diameter).
Located in News / ENISA News
Press Release Malicious actions not necessarily focused on causing disruptions in TELECOM, but system failures still are
ENISA publishes its Annual Incidents report which gives the aggregated analysis of the security incidents causing severe outages in 2015.
Located in News / ENISA News
NBU/ENISA workshop on the NIS Directive and Critical Information Infrastructure Protection
For the second time ENISA is co-organising with the National Security Authority of Slovakia a conference on Critical Information Infrastructure Protection with the aim to bring together the needs of security professionals, public authorities, and the relevant industries for a constructive dialogue.
Located in Events
Report/Study Threat Landscape of Internet Infrastructure
This study details a list of good practices that aim at securing an Internet infrastructure asset from Important Specific Threats. A gap analysis identifies that some assets remain not covered by current good practices: human resources (administrators and operators) for Routing, DNS and Denial of Service, as well as System Configuration and Essential Addressing Protocols for Denial of Service.
Located in Publications
Report/Study Resilience Metrics and Measurements: Challenges and Recommendations
As part of the study run by ENISA, a set of metrics-specific questions was sent to a group of stakeholders. These questions concerned how resilience is measured on a sector basis (the surveyed participants were from public and private organisations, as well as national regulators, academia, etc.). This document presents the results of that study and aims to provide a non-technical overview to policy experts in the area of resilience. The key challenges to resilience measurements and the most interesting aspects of the answers received are summarised and analysed in this document. This report also summarises a number of recommendations arising from the analysis of the information received. The rest of the report is organised as follows. Section 2 presents the main challenges impeding the adoption of a commonly accepted framework for resilience metrics and measurements. In section 3, we summarise the main recommendations for future actions in the area of network and service resilience metrics and measurements. Finally section 4, includes all the detailed input we received from the questionnaires and interviews with stakeholders.
Located in Publications
Report/Study Troff document Resilience Metrics and Measurements: Technical Report
During the ENISA survey study on 'Resilience Metrics and Measurements: Challenges and Recommendations' it was found that there is lack of a standardised framework or good metrics. Resilience was not considered to be a well-defined term and depending on the context, it encompassed several interpretations and viewpoints. Additionally, there was consensus on the fact that information sharing and sources of consolidated information on resilience metrics were not readily available. These challenges were recognised as serious obstacles towards the adoption of resilience metrics. Addressing these concerns, this report represents an attempt to create a single technical source of information on resilience metrics, the taxonomies and the open issues. It puts together work that has been done in the areas of security, dependability and specific taxonomy research under the single umbrella of resilience. It is intended to become a source of information for the community interested on resilience and measurements, but also the cause to initiate more in depth works on the subject. This version is a discussion draft! (for comments please see contact details in the report.)
Located in Publications
Report/Study National Roaming for Resilience
Mobile communications are an integral part of everyday life. In less than 30 years they have surpassed the traditional fixed line telephony. Every day millions of European citizens rely on mobile telephony for work, social life, but also to contact emergency services. Hence outages of a mobile network can have a severe impact on the economy and on society. Mobile network outages are common. In 2012, EU Member States reported 79 significant incidents of electronic communications to ENISA and the European Commission. Most of these incidents had an impact on mobile telephony and mobile Internet. The goal of this report is to help National Regulatory Authority (NRAs) understand if and how roaming at national level could be used to improve resilience of mobile communication networks and services in case of large outages and start the discussion with the market players around this topic.
Located in Publications
Report/Study Critical Cloud Computing-A CIIP perspective on cloud computing services
In this report we look at cloud computing from a Critical Information Infrastructure Protection (CIIP) perspective and we look at a number of scenarios and threats relevant from a CIIP perspective, based on a survey of public sources on uptake of cloud computing and large cyber attacks and disruptions of cloud computing services.
Located in Publications
Report/Study Communication network interdependencies in smart grids
This study focuses on the evaluation of the interdependencies and communications between all the assets that make up the new power grids, their architectures and connections in order to determine their importance, threats, risks, mitigation factors and possible security measures to implement. To obtain this information, experts in the fields and areas related directly with smart grids were contacted to gather their know-how and expertise.
Located in Publications
Report/Study text/texmacs Can we learn from SCADA security incidents?
Security experts across the world continue to sound the alarm bells about the security of Industrial Control Systems (ICS). Industrial Control Systems look more and more like consumer PCs. They are used everywhere and involve a considerable amount of software, often outdated and unpatched. Recent security incidents in the context of SCADA and Industrial Control Systems emphasise greatly the importance of good governance and control of SCADA infrastructures. In particular the ability to respond to critical incidents and be able to analyse and learn from what happened is crucial.
Located in Publications

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information