Search results

83 items matching your search terms.
Filter the results.
Item type









































New items since



Sort by relevance · date (newest first) · alphabetically
Report/Study text/texmacs Be Aware, Be Secure. Synthesis of the results of the first European Cyber Security Month
The report provides a synthesis of the results of the European Cyber Security Month (ECSM) which took place as a pilot project across Europe throughout last October 2012. The report gives an overview of the security-related weeks organised at national level by the eight participating countries - the Czech Republic, Luxembourg, Norway, Portugal, Romania, Slovenia, Spain and the United Kingdom -; describes the role played by ENISA as coordinator of the organisation of the ECSM; and finally identifies a set of lessons learned which could be applied to future ECSMs. This publication will be available soon in e-book format.
Located in Publications
Report/Study C header European Month of Network and Information Security for All - A feasibility study (EN)
The report carries out a feasibility study containing an analysis by examining the possible implementation of a ‘European security month’ in addition to an overview of the prevailing elements of security days/weeks organised at national level across Europe. To this end, ENISA established a virtual working group.
Located in Publications
Report/Study Appstore security: 5 lines of defence against malware
The booming smartphone industry has a special way of delivering software to end-users: appstores. Popular appstores have hundreds of thousands of apps for anything from online banking to mosquito repellent, and the most popular stores (Apple Appstore, Google Android market) claim billions of app downloads. But appstores have not escaped the attention of cyber attackers. Over the course of 2011 numerous malicious apps were found, across a variety of smartphone models. Using malicious apps, attackers can easily tap into the vast amount of private data processed on smartphones such as confidential business emails, location data, phone calls, SMS messages and so on. Starting from a threat model for appstores, this paper identifies five lines of defence that must be in place to address malware in appstores: app review, reputation, kill-switches, device security and jails.
Located in Publications
Report/Study ENISA Smart Grid Security Recommendations
This study makes 10 recommendations to the public and private sector involved in the definition and implementation of smart grids. These recommendations intend to provide useful and practical advice aimed at improving current initiatives, enhancing co-operation, raising awareness, developing new measures and good practices, and reducing barriers to information sharing.
Located in Publications
Report/Study Troff document EISAS Large-Scale Pilot - Collaborative Awareness Raising for EU Citizens & SMEs
To continually raise the level of cyber security awareness of all citizens and businesses, the European Commission decided to promote a collaborative approach for awareness raising in Europe. Introduced in 2006, EISAS, the European Information Sharing and Alert System, aims to enhance the cooperation of Member States in their work to reach out to citizens and SMEs with relevant security information. In 2012 ENISA has run a Large Scale Pilot project. The EISAS Large Scale Pilot Report, details its successful actions, and identifies the cost-effectiveness of European awareness raising collaboration, while the EISAS Updated Roadmap foresee future actions for EISAS.
Located in Publications
Report/Study EISAS - Enhanced Roadmap 2012
The EISAS Enhanced Roadmap 2012 take account of the results of the EISAS Large scale pilot and foresee the next steps required for a full deployment of EISAS in the EU.
Located in Publications
Report/Study ECMAScript program Cooperation between CERTs and Law Enforcement Agencies in the fight against cybercrime - A first collection of practices
The essential aim of this report is to improve the capability of CERTs, with a focus on the national/governmental CERTs (n/g CERTs), to address the network and information security (NIS) aspects of cybercrime. It focuses particularly on supporting n/g CERTs and their hosting organisations in the European Union (EU) Member States in their collaboration with the LEAs. It also intends to be a first collection of practices collected from mature CERTs in Europe, including among other things workflows and collaboration with other key players, in particular different law enforcement authorities, in the fight against cybercrime.
Located in Publications
Report/Study application/x-troff-me Good Practice Guide for Addressing Network and Information Security Aspects of Cybercrime
In 2010 ENISA started its support for operational collaboration between the Computer Emergency Response Teams (CERTs) in the Member States on the one hand and Law Enforcing Agencies (LEA) on the other hand. Various activities have since been launched, including stock takings of legal and operational obstacles that prevent collaboration, advice resulting from that, workshops that brought together members of both communities, consultation with members of both communities, etc. It was soon realised that the process of trust building, tackle obstacles together, discussion and finally working together would need time and active, continuous support from ENISA, CERTs and LEAs, and that ENISA just embarked on a long-term trip to achieve its goals. The document at hand constitutes a “work in progress”, a snapshot of the current status of ENISAs support for CERTs and LEAs, and includes good practice and recommendations for both communities. It must be clear that while we may already be several steps closer to a smoother collaboration, we need to continue our common efforts to reach that goal. This document contains a Good Practice Guides concerning co-operation between Computer Emergency Response Teams (CERTS) and other stakeholders, primarily Law Enforcement Authorities (LEAs) within Europe.
Located in Publications
Report/Study chemical/x-pdb Good Practice Guide for Incident Management
This guide complements the existing set of ENISA guides that support Computer Emergency Response Teams. It describes good practices and provides practical information and guidelines for the management of network and information security incidents with an emphasis on incident handling.
Located in Publications
Report/Study Data breach notifications in the EU
The introduction of a European data breach notification requirement for the electronic communication sector introduced in the review of the ePrivacy Directive (2002/58/EC) is an important development with a potential to increase the level of data security in Europe and foster reassurance amongst citizens on how their personal data is being secured and protected by electronic communication sector operators. Against this background, ENISA reviewed the current situation in order to develop a consistent set of guidelines addressing the technical implementation measures and the procedures, as described by Article 4 of the reviewed Directive 2002/58/EC.
Located in Publications

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information