Search results

97 items matching your search terms.
Filter the results.
Item type



















































New items since



Sort by relevance · date (newest first) · alphabetically
Life-logging risk assessment
"To log or not to log?" Risks and benefits of emerging life-logging applications
Located in Publications
File To log or not to log? - Risks and benefits of emerging life-logging applications [Appendix II]
This is the Appendix II Risk Assessment Spreadsheet, accompanying the deliverable "To log or not to log? - Risks and benefits of emerging life-logging applications"
Located in Publications / Life-logging risk assessment
File To log or not to log? - Risks and benefits of emerging life-logging applications [Appendix I]
This is the Appendix I Scenario Building and Analysis Template, accompanying the deliverable "To log or not to log? - Risks and benefits of emerging life-logging applications".
Located in Publications / Life-logging risk assessment
Report/Study To log or not to log? - Risks and benefits of emerging life-logging applications
Located in Publications
File Octet Stream Ασφάλεια καταστημάτων εφαρμογών – πέντε γραμμές άμυνας – Νέα έκθεση από τον Οργανισμό Κυβερνοασφάλειας ENISA
Ο ENISA δημοσιεύει σήμερα μία νέα έκθεση σχετικά με την Ασφάλειατωνκαταστημάτων εφαρμογώνστην οποία τάσσεται υπέρ της υιοθέτησης μίας βασικής ομάδας 'Πέντε γραμμών άμυνας 'ενάντια στο κακόβουλο λογισμικό (malware).
Located in News / ENISA News / PRs in Greek
Press Release Octet Stream New report: App-store security– the 'five lines of defence'
The Agency today publishes a new report on app-store security where it advocates for a baseline set of ‘five lines of defence ‘ against malware.
Located in News / ENISA News
Mobile malware attacks & the security of app-stores: Agency analysis
The Agency has made a brief analysis of a recent spate of malware attacks on smartphone platforms, and presents a new 'top-ten-risks' for smartphones list.
Located in News / ENISA News
Report/Study Privacy, Accountability and Trust – Challenges and Opportunities
In the study, we focus on some of the available technologies and research results addressing privacy and data protection and topics related to, or influencing privacy, such as consent, accountability, trust, tracking and profiling. The objective is to provide a comprehensive and realistic view of both limitations generated and possibilities provided by technologies in the case of personal data protection rights.
Located in Publications
Report/Study image/x-coreldrawpattern Survey of accountability, trust, consent, tracking, security and privacy mechanisms in online environments
The study, using a survey, attempts to evaluate which are currently the mechanisms deployed in available online services for accountability, consent, trust, security and privacy. While the finding of this survey cannot be easily extrapolated to all online services, some trends are prominent and it is safe to assume that these are valid for most organisations that operate online. Besides these trends, we mention here the lack of a single coherent view on how to best achieve user privacy in online environments. An increase in awareness of privacy and security concepts within organisations and industry sectors appears to be desirable, in order to maintain a high level of security and confidence on the part of users and society in the ICT infrastructure and services provided within the EU. A major area of concern was how the EU would create and maintain a ‘level regulatory playing field’, especially with non-EU based multinationals entering the EU market without proper (privacy) compliance and rapidly establishing a significant user base.
Located in Publications
Report/Study Data breach notifications in the EU
The introduction of a European data breach notification requirement for the electronic communication sector introduced in the review of the ePrivacy Directive (2002/58/EC) is an important development with a potential to increase the level of data security in Europe and foster reassurance amongst citizens on how their personal data is being secured and protected by electronic communication sector operators. Against this background, ENISA reviewed the current situation in order to develop a consistent set of guidelines addressing the technical implementation measures and the procedures, as described by Article 4 of the reviewed Directive 2002/58/EC.
Located in Publications

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information