AVRUPA BİRLİĞİ AĞ ve BİLGİ GÜVENLİĞİ AJANSI 2017 2016 2015 2014 2013 2012 2011 2011 Botnets: Detection, Measurement, Disinfection & Defence 2012 National Cyber Security Strategies: Practical Guide on Development and Execution 2013 Good Practice Guide for CERTs in the Area of Industrial Control Systems eID Authentication Methods in e-Finance and e-Payment Services Cloud Security Incident Reporting On the Security, Privacy and Usability of Online Seals Good Practice Guide for Securely Deploying Governmental Clouds Recommendations for a methodology of the assessment of severity of personal data breaches Recommended Cryptographic Measures Can we learn from SCADA security incidents? Securing Personal Data in the Context of Data Retention 2014 Protection of Underground Electronic Communications Infrastructure Secure ICT Procurement in Electronic Communications Brokerage model for Network and Information Security in Education An Evaluation Framework for National Cyber Security Strategies Report on Cyber Crisis Cooperation and Management Study on Cryptographic Protocols Public Private Partnerships in Network and Information Security Education 2015 Auditing Framework for TSPs Cloud Security Guide for SMEs Analysis of ICS-SCADA Cyber Security Maturity Levels in Critical Sectors Security and Resillience in eHealth Readiness Analysis for the Adoption and Evaluation of Privacy Enhancing Technologies Privacy by Design in Big Data Online Privacy Tools for the General Public Threat Landscape and Good Practice Guide for Software Defined Networks/5G The 2015 Report on National and International Cyber Security Exercises Information Sharing and Common Taxonomies between CSIRTs and Law Enforcement Governance Framework For European Standardisation Cyber Security Information Sharing: An Overview of Regulatory and Non-regulatory Approaches Good Practice Guide on Vulnerability Disclosure Security incidents indicators - measuring the impact of incidents affecting electronic communications Cyber Security for Smart Cities Cyber Security and Resillience of Intelligent Public Transport Certification of Cyber Security skills of ICS/SCADA Professionals Methodologies for the identification of Critical Information Infrastructure assets and services Security Framework for Governmental Clouds CSIRT Capabilities Network and Information Security in the Finance Sector Privacy and Data Protection By Design - from Policy to Engineering National/Governmental CERTs Communication Network Interdependencies in Smart Grids 2016 Proposal for Article 19 Incident Reporting Leading the Way (ENISA CERT Capacity Building Activity) After Action Report Report on Cyber Crisis Cooperation and Management Article 19 Incident Reporting NIS Directive and National CSIRTs Cyber Security and Resilience of Intelligent Public Transport Definition of Cybersecurity Guideline for SMEs on the security of personal data processing Governnment Framework for European Standardisation Big Data Security Qualified Website Authentication Certificates Cyber Insurance: Recent Advantages, Good Practices and Challenges NCSS Good Practice Guide Analysis of Security Measures Deployed by e-Communication Providers ENISA Threat Landscape Report 2016 Big Data Threat, Landscape and Good Practice Guide Review of Cyber Hygiene Practices Report on Cyber Security Information Sharing in the Energy Sector Distributed Ledger Technology & Cybersecurity Challenges of Security Certification in Emerging ICT Environments European Cyber Security Month 2016 Exploring Cloud Incidents A Good Practice Guide of Using taxonomies in Incident Prevention and Detection PETs Controls Matrix: A systematic approach for assessing online and mobile privacy tools Privacy and Security in Personal Data Clouds Securing Smart Airports Security of Mobile Payments and Digital Wallets Smart Hospitals Stocktaking, Analysis and Recommendations on the Protection of CIIs The Cost of Incidents Affecting CIIs NCSS Good Practice Guide 2017 NCSS Analysis of Security Measures deployed by e-Communication Providers Incident Notification for DSPs in the context of the NIS Directive Security Aspects of Virtualization Technical Guidelines for the Implementation of Minimum Security Measures for Digital Service Providers Privacy Enhancing Technologies: Evolution and State of the Art Hardware Threat Landscape and Good Practice Guide Ad-Hoc & Sensor Networking for M2M Communications Gaps in NIS Standardisation Cybersecurity in the EU Common Security and Defence Policy (CSDP) ENISA Annual Incident Reports 2016 Security Guidelines in the Appropriate Use of Qualified Electronic Registered Delivery Services Security Guidelines on the Appropriate Use of Qualified Electronic Signatures Security Guidelines in the Appropriate Use of Qualified Electronic Seals Security Guidelines in the Appropriate Use of Qualified Electronic Time Stamps Security Guidelines in the Appropriate Use of Qualified Website Authentication Certificates Considerations on ICT Security Certification in EU Smartphone Secure Development Guidelines Baseline Security Recommendations for IoT in the Context of Critical Information Infrastructures Recommendations on European Data Protection Certification Annual Incident Analysis Report for the Trust Service Providers Stock Taking of Information Security Training Needs in Critical Sectors Tools and Methodologies to Support Cooperation between CSIRTs and Law Enforcement Improving Cooperation between CSIRTs and Law Enforcement_Legal and Organisational Aspects Kaynak: https://www.enisa.europa.eu/