Dr. Mustafa AFYONLUOGLU – Kişisel Web Sitesi
AVRUPA BİRLİĞİ AĞ ve BİLGİ GÜVENLİĞİ AJANSI
Botnets: Detection, Measurement, Disinfection & Defence
National Cyber Security Strategies: Practical Guide on Development and Execution
Good Practice Guide for CERTs in the Area of Industrial Control Systems
eID Authentication Methods in e-Finance and e-Payment Services
Cloud Security Incident Reporting
On the Security, Privacy and Usability of Online Seals
Good Practice Guide for Securely Deploying Governmental Clouds
Recommendations for a methodology of the assessment of severity of personal data breaches
Recommended Cryptographic Measures
Can we learn from SCADA security incidents?
Securing Personal Data in the Context of Data Retention
Protection of Underground Electronic Communications Infrastructure
Secure ICT Procurement in Electronic Communications
Brokerage model for Network and Information Security in Education
An Evaluation Framework for National Cyber Security Strategies
Report on Cyber Crisis Cooperation and Management
Study on Cryptographic Protocols
Public Private Partnerships in Network and Information Security Education
Auditing Framework for TSPs
Cloud Security Guide for SMEs
Analysis of ICS-SCADA Cyber Security Maturity Levels in Critical Sectors
Security and Resillience in eHealth
Readiness Analysis for the Adoption and Evaluation of Privacy Enhancing Technologies
Privacy by Design in Big Data
Online Privacy Tools for the General Public
Threat Landscape and Good Practice Guide for Software Defined Networks/5G
The 2015 Report on National and International Cyber Security Exercises
Information Sharing and Common Taxonomies between CSIRTs and Law Enforcement
Governance Framework For European Standardisation
Cyber Security Information Sharing: An Overview of Regulatory and Non-regulatory Approaches
Good Practice Guide on Vulnerability Disclosure
Security incidents indicators - measuring the impact of incidents affecting electronic communications
Cyber Security for Smart Cities
Cyber Security and Resillience of Intelligent Public Transport
Certification of Cyber Security skills of ICS/SCADA Professionals
Methodologies for the identification of Critical Information Infrastructure assets and services
Security Framework for Governmental Clouds
CSIRT Capabilities
Network and Information Security in the Finance Sector
Privacy and Data Protection By Design - from Policy to Engineering
National/Governmental CERTs
Communication Network Interdependencies in Smart Grids
Proposal for Article 19 Incident Reporting
Leading the Way (ENISA CERT Capacity Building Activity)
After Action Report
Article 19 Incident Reporting
NIS Directive and National CSIRTs
Cyber Security and Resilience of Intelligent Public Transport
Definition of Cybersecurity
Guideline for SMEs on the security of personal data processing
Governnment Framework for European Standardisation
Big Data Security
Qualified Website Authentication Certificates
Cyber Insurance: Recent Advantages, Good Practices and Challenges
NCSS Good Practice Guide
Analysis of Security Measures Deployed by e-Communication Providers
ENISA Threat Landscape Report 2016
Big Data Threat, Landscape and Good Practice Guide
Review of Cyber Hygiene Practices
Report on Cyber Security Information Sharing in the Energy Sector
Distributed Ledger Technology & Cybersecurity
Challenges of Security Certification in Emerging ICT Environments
European Cyber Security Month 2016
Exploring Cloud Incidents
A Good Practice Guide of Using taxonomies in Incident Prevention and Detection
PETs Controls Matrix: A systematic approach for assessing online and mobile privacy tools
Privacy and Security in Personal Data Clouds
Securing Smart Airports
Security of Mobile Payments and Digital Wallets
Smart Hospitals
Stocktaking, Analysis and Recommendations on the Protection of CIIs
The Cost of Incidents Affecting CIIs
NCSS Analysis of Security Measures deployed by e-Communication Providers
Incident Notification for DSPs in the context of the NIS Directive
Security Aspects of Virtualization
Technical Guidelines for the Implementation of Minimum Security Measures for Digital Service Providers
Privacy Enhancing Technologies: Evolution and State of the Art
Hardware Threat Landscape and Good Practice Guide
Ad-Hoc & Sensor Networking for M2M Communications
Gaps in NIS Standardisation
Cybersecurity in the EU Common Security and Defence Policy (CSDP)
ENISA Annual Incident Reports 2016
Security Guidelines in the Appropriate Use of Qualified Electronic Registered Delivery Services
Security Guidelines on the Appropriate Use of Qualified Electronic Signatures
Security Guidelines in the Appropriate Use of Qualified Electronic Seals
Security Guidelines in the Appropriate Use of Qualified Electronic Time Stamps
Security Guidelines in the Appropriate Use of Qualified Website Authentication Certificates
Considerations on ICT Security Certification in EU
Smartphone Secure Development Guidelines
Baseline Security Recommendations for IoT in the Context of Critical Information Infrastructures
Recommendations on European Data Protection Certification
Annual Incident Analysis Report for the Trust Service Providers
Stock Taking of Information Security Training Needs in Critical Sectors
Tools and Methodologies to Support Cooperation between CSIRTs and Law Enforcement
Improving Cooperation between CSIRTs and Law Enforcement_Legal and Organisational Aspects
Kaynak: https://www.enisa.europa.eu/