• 7 Steps to shore up the Border Gateway Protocol (BGP)

    In this paper ENISA highlights the security vulnerabilities of BGP and explains why it is so important to address them. Working closely with experts from industry ENISA derived a shortlist of 7 basic BGP security measures which are industry good...

    Published on May 17, 2019
  • Threat Landscape of Internet Infrastructure

    This study details a list of good practices that aim at securing an Internet infrastructure asset from Important Specific Threats. A gap analysis identifies that some assets remain not covered by current good practices: human resources...

    Published on January 15, 2015
  • ENISA Report on Resilient Internet Interconnections

    This study provides an overview of past incidents that impaired the Internet’s interconnection fabric, and discusses good practices to limit or avoid the impact of future crises events.

    Published on June 21, 2012
  • A Security Analysis of Next Generation Web Standards

    The web browser is arguably the most security-critical component in our information infrastructure. It has become the channel through which most of our information passes. ENISA is seizing a unique chance to make detailed recommendations for...

    Published on July 31, 2011
  • Secure Software Engineering Initiatives

    Most high-profile cyberattacks are enabled by flaws in computer systems‟ software, so-called software vulnerabilities in the application layer. As a preliminary step towards addressing the problem of software vulnerabilities, we have compiled a list...

    Published on May 01, 2011
  • Policy statement

    Position statement prepared for the Ministerial Conference on CIIP organised by the Hungarian EU Presidency in Balatonfüred on 14-15 April 2011

    Published on April 15, 2011
  • Resilience of the Internet Interconnection Ecosystem

    This study looks at the resilience of the Internet interconnection ecosystem. The Internet is a network of networks, and the interconnection ecosystem is the collection of layered systems that holds it together. The interconnection ecosystem is...

    Published on April 11, 2011
  • Botnets: Measurement, Detection, Disinfection and Defence

    “Botnets: Measurement, Detection, Disinfection and Defence” is a comprehensive report on how to assess botnet threats and how to neutralise them. It is survey and analysis of methods for measuring botnet size and how best to assess the threat posed...

    Published on March 07, 2011
  • Botnets: 10 Tough Questions

    As part of the project “Botnets: Detection, Measurement, Mitigation & Defence” a series of questions was discussed by internationally renowned experts in the field of botnets between September and November 2010. This document presents a selection of...

    Published on March 07, 2011
  • Resilience Metrics and Measurements: Technical Report

    During the ENISA survey study on 'Resilience Metrics and Measurements: Challenges and Recommendations' it was found that there is lack of a standardised framework or good metrics. Resilience was not considered to be a well-defined term and depending...

    Published on February 01, 2011
  • Resilience Metrics and Measurements: Challenges and Recommendations

    As part of the study run by ENISA, a set of metrics-specific questions was sent to a group of stakeholders. These questions concerned how resilience is measured on a sector basis (the surveyed participants were from public and private...

    Published on February 01, 2011
Browse the Topics

This site uses cookies to offer you a better browsing experience.
Aside from essential cookies we also use tracking cookies for analytics.
Find out more on how we use cookies.

Accept all cookies Accept only essential cookies