ENISA Raporları

Avrupa Birliği Raporları

ENISA_Logo2

AVRUPA BİRLİĞİ
SİBER GÜVENLİK AJANSI

EU European Union

Toplam: 428 Rapor

Son Güncelleme: 15 Eylül 2021

2021

Toplam: 37

  1. 18.01.2021: Cloud Security for Healthcare Services
  2. 26.01.2021: 2020 Report on CSIRT-LE Cooperation: study of roles and synergies among selected countries
  3. 28.01.2021: Data Pseudonymisation: Advanced Techniques and Use Cases
  4. 08.02.2021: TeleTrusT - Guideline "State of the Art" Technical & Organizational Measures
  5. 09.02.2021: Post-Quantum Cryptography: Current state and quantum mitigation
  6. 09.02.2021: Crypto Assets: Introduction to Digital Currencies and Distributed Ledger Technologies
  7. 11.02.2021: Cybersecurity Challenges in the Uptake of Artificial Intelligence in Autonomous Driving
  8. 24.02.2021: Security in 5G Specifications - Controls in 3GPP
  9. 05.03.2021: EU Cybersecurity Initiatives in the Finance Sector
  10. 11.03.2021: Recommendations for Qualified Trust Service Providers based on Standards
  11. 11.03.2021: Remote ID Proofing
  12. 11.03.2021: Conformity Assessment of Qualified Trust Service Providers
  13. 11.03.2021: Security Framework for Trust Service Providers
  14. 11.03.2021: Security Framework for Qualified Trust Service Providers
  15. 17.03.2021: Technical Guideline on Incident Reporting under the EECC
  16. 19.03.2021:  Situational Report on Microsoft Exchange Vulnerabilities
  17. 22.03.2021: Technical Guideline on Incident Reporting under the EECC
  18. 29.03.2021: ECSM Deployment Report - 2020
  19. 09.04.2021: Cybersecurity Certification Market Study
  20. 12.05.2021: ECSC 2020 Analysis Report
  21. 15.04.2021: European Cybersecurity Month 2020 - Deployment Report
  22. 23.04.2021: Cybersecurity Research Directions for the EU’s Digital Strategic Autonomy
  23. 03.05.2021: Post-Quantum Cryptography: Current state and quantum mitigation
  24. 05.05.2021: Recommendations for the security of CAM
  25. 10.05.2021: CTF Events
  26. 25.05.2021: Cybersecurity Certification: Candidate EUCC Scheme V1.1.1
  27. 26.05.2021: Public Consultation on the draft Candidate EUCC Scheme
  28. 03.06.2021: PSIRT Expertise and Capabilities Development
  29. 28.65.2021: Cybersecurity for SMEs - Challenges and Recommendations
  30. 28.05.2021: Cybersecurity guide for SMEs - 12 steps to securing your business
  31. 07.07.2021: 5G Supplement - to the Guideline on Security Measures under the EECC
  32. 07.07.2021: Guideline on Security Measures under the EECC
  33. 13.07.2021: Assessment of EU Telecom Security Legislation
  34. 26.07.2021: Trust Services Security Incidents 2020 - Annual Report
  35. 26.07.2021: Telecom Security Incidents 2020 - Annual Report
  36. 29.07.2021: Threat Landscape for Supply Chain Attacks
  37. 13.09.2021: Methodology for a Sectoral Cybersecurity Assessment

2020

Toplam: 57

  1. 10.01.2020: Security Supervision under the EECC
  2. 10.01.2020: Good practices in innovation on cybersecurity under the NCSS
  3. 19.01.2020: ECSM Deployment Report 2019
  4. 20.01.2020: ECSC 2019 Analysis Report
  5. 04.02.2020: Standardisation in support of the Cybersecurity Certification
  6. 24.02.2020: Procurement Guidelines for Cybersecurity in Hospitals
  7. 15.03.2020: eIDAS compliant eID Solutions
  8. 26.03.2020: Cybersecurity Skills Development in the EU
  9. 02.04.2020: Roadmap on the cooperation between CSIRTS and LE
  10. 15.04.2020: Advancing Software Security in the EU
  11. 23.04.2020: Encrypted Traffic Analysis
  12. 07.05.2020: An overview on enhancing technical cooperation between CSIRTs and LE
  13. 12.05.2020: Power Sector Dependency on Time Service: attacks against time sensitive services
  14. 26.05.2020: Proactive detection – Survey results
  15. 26.05.2020: Proactive detection - Good practices gap analysis recommendations
  16. 26.05.2020: Proactive detection – Measures and information sources
  17. 02.06.2020: Cybersecurity Certification: EUCC Candidate Scheme
  18. 10.06.2020: Trust Services Security Incidents 2019 Annual Analysis Report
  19. 17.06.2020: ENISA Strategy - A Trusted and Cyber Secure Europe
  20. 23.06.2020: Telecom Services Security Incidents 2019 Annual Analysis Report
  21. 20.10.2020: ENISA Threat Landscape 2020 - Cyber espionage
  22. 20.10.2020  ENISA Threat Landscape - The year in review
  23. 20.10.2020: ENISA Threat Landscape - Emerging trends
  24. 20.10.2020: ENISA Threat Landscape 2020 - Physical manipulation/ damage/ theft/ loss
  25. 20.10.2020: ENISA Threat Landscape 2020 - Cyber threat intelligence overview
  26. 20.10.2020: ENISA Threat Landscape 2020 - Spam
  27. 20.10.2020: ENISA Threat Landscape 2020 - Malware
  28. 20.10.2020: ENISA Threat Landscape 2020 - Data Breach
  29. 20.10.2020: ENISA Threat Landscape 2020 - Insider threat
  30. 20.10.2020: ENISA Threat Landscape 2020 - Botnet
  31. 20.10.2020: ENISA Threat Landscape 2020 - Research topics
  32. 20.10.2020: ENISA Threat Landscape 2020 - Cryptojacking
  33. 20.10.2020: ENISA Threat Landscape 2020 - Ransomware
  34. 20.10.2020: ENISA Threat Landscape 2020 - Information Leakage
  35. 20.10.2020: ENISA Threat Landscape 2020 - Distributed denial of service
  36. 20.10.2020: ENISA Threat Landscape 2020 - Phishing
  37. 20.10.2020: ENISA Threat Landscape 2020 - Main Incidents
  38. 20.10.2020: ENISA Threat Landscape 2020 - List of top 15 threats
  39. 20.10.2020: ENISA Threat Landscape 2020 - Sectoral/thematic threat analysis
  40. 20.10.2020: ENISA Threat Landscape 2020 - Insider Threat
  41. 20.10.2020: ENISA Threat Landscape 2020 - Identity Theft
  42. 20.10.2020: ENISA Threat Landscape 2020 - Web-based attacks
  43. 20.10.2020: ENISA Threat Landscape 2020 - Web application attacks
  44. 09.11.2020: Guidelines for Securing the Internet of Things
  45. 13.11.2020: Railway Cybersecurity
  46. 20.11.2020: Cybersecurity Stocktaking in the CAM
  47. 26.11.2020: Telecom Security During a Pandemic
  48. 07.12.2020: National Capabilities Assessment Framework
  49. 10.12.2020: How to set up CSIRT and SOC
  50. 10.12.2020: Sectoral CSIRT Capabilities - Energy and Air Transport
  51. 10.12.2020: 5G Supplement - to the Guideline on Security Measures under the EECC
  52. 10.12.2020: Guideline on Security Measures under the EECC
  53. 11.12.2020: NIS Investments Report
  54. 14.12.2020: ENISA Threat Landscape for 5G Networks Report
  55. 15.12.2020: Artificial Intelligence Cybersecurity Challenges
  56. 17.12.2020: Guidelines - Cyber Risk Management for Ports
  57. 22.12.2020: EUCS – Cloud Services Scheme

2019

Toplam: 37

  1. 09.01.2019: Cooperation between CSIRTs and Law Enforcement: interaction with the Judiciary
  2. 14.01.2019: State of Vulnerabilities 2018/2019 - Analysis of Events in the life of Vulnerabilities
  3. 15.01.2019: Towards global acceptance of eIDAS audits
  4. 17.01.2019: IoT Security Standards Gap Analysis
  5. 24.01.2019: Good practices on the implementation of regulatory technical standards
  6. 28.01.2019: Reinforcing trust and security in the area of electronic communications and online services
  7. 28.01.2019: Recommendations on shaping technology according to GDPR provisions - Exploring the notion of data protection by default
  8. 28.01.2019: Recommendations on shaping technology according to GDPR provisions - An overview on data pseudonymisation
  9. 28.01.2019: ENISA Threat Landscape Report 2018
  10. 31.01.2019: ICT security certification opportunities in the healthcare sector
  11. 31.01.2019: ENISA’s PETs Maturity Assessment Repository
  12. 06.02.2019: Study on CSIRT landscape and IR capabilities in Europe 2025
  13. 07.02.2019: TeleTrusT - Guideline "State of the Art" Technical & Organizational Measures
  14. 14.03.2019: Towards a framework for policy development in cybersecurity - Security and privacy considerations in autonomous agents
  15. 15.03.2019: Guidance and gaps analysis for European standardisation
  16. 09.04.2019: ENISA Maturity Evaluation Methodology for CSIRTs
  17. 16.04.2019: Cybersecurity Culture Guidelines: 'Technical Annex: Evidence Reviews'
  18. 16.04.2019: Cybersecurity Culture Guidelines: Behavioural Aspects of Cybersecurity
  19. 30.04.2019: ENISA CSIRT maturity assessment model
  20. 15.05.2019: Challenges and opportunities for EU cybersecurity start-ups
  21. 17.05.2019:  7 Steps to shore up the Border Gateway Protocol (BGP)
  22. 20.05.2019:  Industry 4.0 - Cybersecurity Challenges and Recommendations
  23. 05.06.2019:  Annual Report Telecom Security Incidents 2018
  24. 15.06.2019:  Trust Services Security Incidents 2018 - Annual report
  25. 25.06.2019:   Bolstering ENISA in the EU Cybersecurity Certification Framework
  26. 04.09.2019:   Secure Group Communications for incident response and operational communities
  27. 15.11.2019:   Assessment of ETSI TS 119 403-3 related to eIDAS
  28. 15.11.2019:   Stock taking of security requirements set by different legal frameworks on OES and DSPs
  29. 19.11.2019:   Good Practices for Security of IoT - Secure Software Development Lifecycle
  30. 19.11.2019:   Good practices in innovation on Cybersecurity under the NCSS
  31. 21.11.2019:   ENISA threat landscape for 5G Networks
  32. 25.11.2019:   ENISA good practices for security of Smart Cars
  33. 26.11.2019:   Port Cybersecurity - Good practices for cybersecurity in the maritime sector
  34. 27.11.2019:   EU Member States incident response development status report
  35. 03.12.2019:   Pseudonymisation techniques and best practices
  36. 17.12.2019:   Recommendations for technical implementation of the eIDAS Regulation
  37. 18.12.2019:   Overview of standards related to eIDAS

2018

Toplam: 34

  1. 08.01.2018: The European Cyber Security Challenge: Lessons Learned report
  2. 08.01.2018: QWACs Plugin
  3. 09.01.2018: Annual Privacy Forum 2017
  4. 14.01.2018: Priorities for EU research
  5. 15.01.2018: ENISA Article 14 Requests
  6. 15.01.2018: ENISA Threat Landscape Report 2017
  7. 15.01.2018: Maturity Reference for CSIRTs – Executive Summary
  8. 15.01.2018: eIDAS: Overview on the implementation and uptake of Trust Services
  9. 18.01.2018: Online Tracking and User Protection Mechanisms
  10. 18.01.2018: Mapping of OES Security Requirements to Specific Sectors
  11. 18.01.2018: Overview of the practices of ICT Certification Laboratories in Europe
  12. 26.01.2018: Reference Incident Classification Taxonomy
  13. 29.01.2018: Handbook on Security of Personal Data Processing
  14. 29.01.2018: Privacy and data protection in mobile applications
  15. 31.01.2018: Looking into the crystal ball: A report on emerging technologies and security challenges
  16. 01.02.2018: Improving recognition of ICT security standards
  17. 06.02.2018: Cyber Security Culture in organisations
  18. 06.02.2018: European Cyber Security Month 2017
  19. 14.02.2018: Public Private Partnerships (PPP) - Cooperative models
  20. 14.02.2018: Information Sharing and Analysis Center (ISACs) - Cooperative models
  21. 07.03.2018:A tool on Privacy Enhancing Technologies (PETs) knowledge management and maturity assessment
  22. 26.03.2018: Exploring the opportunities and limitations of current Threat Intelligence Platforms
  23. 28.03.2018: Signalling Security in Telecom SS7/Diameter/5G
  24. 30.07.2018: Annual report Telecom security incidents 2017
  25. 17.09.2018: Towards secure convergence of Cloud and IoT
  26. 08.10.2018: Annual Report Trust Services Security Incidents 2017
  27. 19.11.2018: Good Practices for Security of Internet of Things in the context of Smart Manufacturing
  28. 28.11.2018: Guidelines on assessing DSP security and OES compliance with the NISD security requirements
  29. 30.11.2018: Good practices on interdependencies between OES and DSPs
  30. 12.12.2018: Guideline on assessing security measures in the context of Article 3(3) of the Open Internet regulation
  31. 14.12.2018: Economics of Vulnerability Disclosure
  32. 14.12.2018: Assessment of Standards related to eIDAS
  33. 19.12.2018: Analysis of the European R&D priorities in cybersecurity
  34. 20.12.2018: Cyber Europe 2018 - After Action Report

2017

Toplam: 44

  1. 13.01.2017: Cyber Security and Resilience of smart cars
  2. 18.01.2017: Distributed Ledger Technology & Cybersecurity - Improving information security in the financial sector
  3. 21.01.2017: Indispensable baseline security requirements for the procurement of secure ICT products and services
  4. 27.01.2017: Guidelines for SMEs on the security of personal data processing
  5. 30.01.2017: A good practice guide of using taxonomies in incident prevention and detection
  6. 01.02.2017: Communication network dependencies for ICS/SCADA Systems
  7. 03.02.2017: Report on Cyber Security Information Sharing in the Energy Sector
  8. 06.02.2017: Challenges of security certification in emerging ICT environments
  9. 07.02.2017: Privacy and Security in Personal Data Clouds
  10. 07.02.2017: European Cyber Security Month 2016 - Deployment report
  11. 07.02.2017: Cyber Hygiene
  12. 08.02.2017: ENISA Threat Landscape Report 2016
  13. 08.02.2017: Hardware Threat Landscape and Good Practice Guide
  14. 08.02.2017: Ad-hoc & sensor networking for M2M Communications - Threat Landscape and Good Practice Guide
  15. 10.02.2017: Smartphone Secure Development Guidelines
  16. 10.02.2017: Security aspects of virtualization
  17. 16.02.2017: Technical Guidelines for the implementation of minimum security measures for Digital Service Providers
  18. 27.02.2017: Incident notification for DSPs in the context of the NIS Directive
  19. 01.03.2017: Article 19 Incident reporting
  20. 09.03.2017: Annual Privacy Forum 2016
  21. 09.03.2017: Privacy Enhancing Technologies: Evolution and State of the Art
  22. 15.03.2017: Gaps in NIS standardisation - Recommendations for improving NIS in EU standardisation policy
  23. 08.05.2017: Recommendations on aligning research programme with policy
  24. 16.06.2017: Annual Incident Reports 2016
  25. 29.06.2017: Security guidelines on the appropriate use of qualified electronic registered delivery services
  26. 29.06.2017: Security guidelines on the appropriate use of qualified website authentication certificates
  27. 29.06.2017: Security guidelines on the appropriate use of qualified electronic time stamps
  28. 29.06.2017: Security guidelines on the appropriate use of qualified electronic signatures
  29. 29.06.2017: Security guidelines on the appropriate use of qualified electronic seals
  30. 30.06.2017: Cyber Europe 2016: After Action Report
  31. 19.09.2017: Considerations on ICT security certification in EU - Survey Report
  32. 15.11.2017: Commonality of risk assessment language in cyber insurance
  33. 20.11.2017: Baseline Security Recommendations for IoT
  34. 27.11.2017: Recommendations on European Data Protection Certification
  35. 29.11.2017: Annual Incident Analysis Report for the Trust Service Providers
  36. 07.12.2017: Stock taking of information security training needs in critical sectors
  37. 15.12.2017: Tools and Methodologies to Support Cooperation between CSIRTs and Law Enforcement
  38. 15.12.2017: Improving Cooperation between CSIRTs and Law Enforcement: Legal and Organisational Aspects
  39. 19.12.2017:Security framework for Trust Service Providers - Technical guidelines on trust services
  40. 19.12.2017: Conformity assessment of Trust Service Providers - Technical guidelines on trust services
  41. 19.12.2017: Guidelines on Termination of Qualified Trust Services
  42. 19.12.2017: Guidelines on Initiation of Qualified Trust Services - Technical guidelines on trust services
  43. 19.12.2017: Guidelines on Supervision of Qualified Trust Services - Technical guidelines on trust services
  44. 19.12.2017: Recommendations for QTSPs based on Standards - Technical guidelines on trust services

2016

Toplam: 32

  1. 11.01.2016: CSIRT Capabilities. How to assess maturity? Guidelines for national and governmental CSIRTs
  2. 12.01.2016: Cyber Security and Resilience of Intelligent Public Transport. Good practices and recommendations
  3. 12.01.2016: Architecture model of the transport sector in Smart Cities
  4. 18.01.2016: Good Practice Guide on Vulnerability Disclosure. From challenges to recommendations
  5. 21.01.2016: Stocktaking, Analysis and Recommendations on the protection of CIIs
  6. 26.01.2016: Information sharing and common taxonomies between CSIRTs and Law Enforcement
  7. 27.01.2016: ENISA Threat Landscape 2015
  8. 27.01.2016: Threat Landscape and Good Practice Guide for Software Defined Networks/5G
  9. 27.01.2016: Big Data Threat Landscape
  10. 29.01.2016: Communication network interdependencies in smart grids
  11. 09.02.2016: Analysis of security measures deployed by e-communication providers
  12. 26.02.2016: NIS Directive and national CSIRTs
  13. 08.03.2016: Big Data Security
  14. 09.03.2016: Security incidents indicators - measuring the impact of incidents affecting electronic communications
  15. 31.03.2016: Readiness Analysis for the Adoption and Evolution of Privacy Enhancing Technologies
  16. 04.04.2016: Common practices of EU-level crisis management and applicability to the cyber crises
  17. 16.05.2016: Qualified Website Authentication Certificates
  18. 01.06.2016: Exploring Cloud Incidents
  19. 17.06.2016: Information security and privacy standards for SMEs
  20. 01.07.2016: Definition of Cybersecurity - Gaps and overlaps in standardisation
  21. 01.07.2016: Governance framework for European standardisation
  22. 01.07.2016: Analysis of standards related to Trust Service Providers - Mapping of requirements of eIDAS to existing standards
  23. 05.08.2016: The cost of incidents affecting CIIs
  24. 25.08.2016: Strategies for incident response and cyber crisis cooperation
  25. 05.10.2016: Annual Incident Reports 2015
  26. 07.11.2016: Cyber Insurance: Recent Advances, Good Practices and Challenges
  27. 14.11.2016: NCSS Good Practice Guide
  28. 24.11.2016:  Cyber security and resilience for Smart Hospitals
  29. 16.12.2016: Securing Smart Airports
  30. 19.12.2016: Security of Mobile Payments and Digital Wallets
  31. 20.12.2016: Towards a Digital Single Market for NIS Products and Services
  32. 20.12.2016PETs controls matrix - A systematic approach for assessing online and mobile privacy tools

2015

Toplam: 34

  1. 12.01.2015: Privacy and Data Protection by Design
  2. 15.01.2015: Threat Landscape of Internet Infrastructure
  3. 12.01.2015: Network and Information Security in the Finance Sector
  4. 19.01.2015: Actionable information for security incident response
  5. 19.01.2015: Standards and tools for exchange and processing of actionable information
  6. 27.01.2015: ENISA Threat Landscape 2014
  7. 09.02.2015: Threat Landscape for Smart Home and Media Convergence
  8. 10.02.2015: European Cyber Security Month - Deployment report
  9. 19.02.2015: Certification of Cyber Security skills of ICS/SCADA professionals
  10. 23.02.2015: Methodologies for the identification of Critical Information Infrastructure assets and services
  11. 26.02.2015: Security Framework for Governmental Clouds
  12. 20.03.2015: National/governmental CERTs - ENISA's recommendations on baseline capabilities
  13. 24.03.2015: Standardisation in the field of Electronic Identities and Trust Service Providers
  14. 25.03.2015: Electronic evidence - a basic guide for First Responders
  15. 02.04.2015: Auditing Framework for TSPs
  16. 09.04.2015: Guideline on Security measures for Article 4 and Article 13a
  17. 10.04.2015: Cloud Security Guide for SMEs
  18. 15.04.2015: EP3R 2009-2013 Future of NIS Public Private Cooperation
  19. 11.09.2015: Supply Chain Integrity: An overview of the ICT supply chain risks and challenges, and vision for the way forward (2015)
  20. 14.09.2015: Annual Incident Reports 2014
  21. 14.09.2015: Technical Guideline on Threats and Assets
  22. 23.09.2015: ENISA Cyber Europe 2014 - After Action Report
  23. 19.10.2015: Status of privacy and NIS course curricula in EU Member States
  24. 12.11.2015: ENISA’s CSIRT-related capacity building activities
  25. 01.12.2015: Security and Resilience of Smart Home Environments
  26. 03.12.2015: Technical guideline for Incident Reporting
  27. 07.12.2015: Secure Use of Cloud Computing in the Finance Sector
  28. 11.12.2015: Analysis of ICS-SCADA Cyber Security Maturity Levels in Critical Sectors
  29. 14.12.2015: European Cyber Security Month 2015 - Deployment Report
  30. 14.12.2015: Latest Report on National and International Cyber Security Exercises
  31. 16.12.2015:cCyber Security Information Sharing: An Overview of Regulatory and Non-regulatory Approaches
  32. 17.12.2015: Privacy by design in big data
  33. 17.12.2015: Online privacy tools for the general public
  34. 18.12.2015: Security and Resilience in eHealth Infrastructures and Services

2014

2013

Toplam: 44

  1. 08.01.2013: ENISA Threat Landscape 2012
  2. 14.02.2013: Critical Cloud Computing-A CIIP perspective on cloud computing services
  3. 13.03.2013: Flash note: Cyber-attacks – a new edge for old weapons
  4. 12.04.2013: Flash Note: Can Recent Attacks Really Threaten Internet Availability?
  5. 20.08.2013: Annual Incident Reports 2012
  6. 19.09.2013: ENISA Threat Landscape mid year 2013
  7. 03.10.2013: Schemes for auditing security measures
  8. 09.10.2013: Can we learn from SCADA security incidents?
  9. 18.10.2013: Cybersecurity cooperation - Defending the digital frontline
  10. 24.10.2013: Report on Second International Conference on Cyber-crisis Cooperation and Exercises
  11. 29.10.2013: Algorithms, Key Sizes and Parameters Report - 2013
  12. 04.11.2013: Recommended cryptographic measures - Securing personal data
  13. 15.11.2013: Good Practice Guide for securely deploying Governmental Clouds
  14. 18.11.2013: 8th ENISA Workshop ‘CERTs in Europe’ report
  15. 19.11.2013: National-level Risk Assessments: An Analysis Report
  16. 20.11.2013: Detect, SHARE, Protect - Solutions for Improving Threat Data Exchange among CERTs
  17. 21.11.2013: Security certification practice in the EU - Information Security Management Systems - A case study
  18. 21.11.2013: Alerts-Warnings-Announcements
  19. 27.11.2013: National Roaming for Resilience
  20. 28.11.2013: A Good Practice Collection for CERTs on the Directive on attacks against information systems
  21. 04.12.2013: Good practice guide for CERTs in the area of Industrial Control Systems - Computer Emergency Response Capabilities considerations for ICS
  22. 06.12.2013: Window of exposure… a real problem for SCADA systems?
  23. 09.12.2013: EISAS Deployment feasibility study
  24. 09.12.2013: Incident Reporting for Cloud Computing
  25. 10.12.2013: Securing personal data in the context of data retention
  26. 10.12.2013: Good Practices for an EU ICS Testing Coordination Capability
  27. 11.12.2013: ENISA Threat Landscape 2013 - Overview of current and emerging cyber-threats
  28. 12.12.2013: CERT community - Recognition mechanisms and schemes
  29. 13.12.2013: Trusted e-ID infrastructures and services in EU
  30. 13.12.2013: Trusted e-ID Infrastructures and services in the EU - Recommendations for Trusted Provision of e-Government services
  31. 16.12.2013: Roadmap for European Cyber Security Month
  32. 16.12.2013: Power Supply Dependencies in the Electronic Communications Sector
  33. 16.12.2013: Mutual Aid for Resilient Infrastructure in Europe (M.A.R.I.E.) - Phase II: Recommendations Report
  34. 16.12.2013: On the security, privacy and usability of online seals
  35. 17.12.2013: Smart Grid Threat Landscape and Good Practice Guide
  36. 20.12.2013: Proposal for One Security Framework for Articles 4 and 13a
  37. 20.12.2013: EP3R 2013 – Task Forces on Terminology Definitions and Categorisation of Assets (TF-TDCA)
  38. 20.12.2013: Position Paper of the EP3R Task Forces on Incident Management and Mutual Aid Strategies (TF-MASIM)
  39. 20.12.2013: Position Paper of the EP3R Task Forces on Trusted Information Sharing (TF-TIS)
  40. 20.12.2013: eID Authentication methods in e-Finance and e-Payment services - Current practices and Recommendations
  41. 20.12.2013: Recommendations for a methodology of the assessment of severity of personal data breaches
  42. 20.12.2013: Guidelines for trust service providers - Part 1: Security framework
  43. 20.12.2013: Guidelines for trust service providers - Part 2: Risk assessment
  44. 20.12.2013: Guidelines for trust service providers - Part 3: Mitigating the impact of security incidents

2012

Toplam: 38

  1. 16.01.2012: NIS in Education
  2. 22.02.2012: Study on data collection and storage in the EU
  3. 28.02.2012: Cooperation between CERTs and Law Enforcement Agencies in the fight against cybercrime - A first collection of practices
  4. 28.02.2012: Study on monetising privacy. An economic model for pricing personal information
  5. 02.04.2012: Procure Secure: A guide to monitoring of security service levels in cloud contracts
  6. 04.05.2012: Recommendations for technical implementation of Art.4
  7. 08.05.2012: National Cyber Security Strategies
  8. 08.06.2012: Flash note: The threat from flamer
  9. 21.06.2012: ENISA Report on Resilient Internet Interconnections
  10. 28.06.2012: Incentives and barriers of the cyber insurance market in Europe
  11. 10.07.2012: ENISA Smart Grid Security Recommendations
  12. 30.07.2012: Flash Note: Password security-a joint effort between end-users and service providers
  13. 27.08.2012: Cyber Incident Reporting in the EU
  14. 11.10.2012: Annual Incident Report 2011
  15. 13.10.2012: EISAS - Enhanced Roadmap 2012
  16. 18.10.2012: Consumerization of IT: Top Risks and Opportunities
  17. 25.10.2012: National and International Cyber Security Exercises: Survey, Analysis & Recommendations
  18. 14.11.2012: Privacy considerations of online behavioural tracking
  19. 20.11.2012: The right to be forgotten - between expectations and practice
  20. 22.11.2012: Proactive detection of security incidents II - Honeypots
  21. 28.11.2012: Good Practice Guide for Addressing Network and Information Security Aspects of Cybercrime
  22. 30.11.2012: Involving Intermediaries in Cyber-security Awareness Raising
  23. 05.12.2012: EU Cyber Cooperation-The Digital Frontline
  24. 07.12.2012: Roadmap to provide more proactive and efficient CERT training
  25. 10.12.2012: Collaborative Solutions For Network Information Security in Education
  26. 12.12.2012: Introduction to Return on Security Investment
  27. 12.12.2012: Report on Annual Privacy Forum 2012
  28. 12.12.2012: Report on 7th ENISA CERT Workshop
  29. 13.12.2012: EISAS Large-Scale Pilot - Collaborative Awareness Raising for EU Citizens & SMEs
  30. 17.12.2012: Be Aware, Be Secure. Synthesis of the results of the first European Cyber Security Month
  31. 17.12.2012: Deployment of Baseline Capabilities of n/g CERTs - Status Report 2012
  32. 17.12.2012: Baseline Capabilities of n/g CERTs - Updated Recommendations 2012
  33. 19.12.2012: Consumerization of IT: Final report on Risk Mitigation Strategies and Good Practices
  34. 19.12.2012: Emergency Communications Stocktaking
  35. 19.12.2012: Implementation of article 15
  36. 19.12.2012: Appropriate security measures for smart grids
  37. 19.12.2012: National Cyber Security Strategies: An Implementation Guide
  38. 19.12.2012: Cyber Europe 2012 - Key Findings Report

2011

Toplam: 49

  1. 13.01.2011: Data breach notifications in the EU
  2. 17.01.2011: Security and Resilience in Governmental Clouds
  3. 24.01.2011: Enabling and managing end-to-end resilience
  4. 31.01.2011: Survey of accountability, trust, consent, tracking, security and privacy mechanisms in online environments
  5. 01.02.2011: Resilience Metrics and Measurements: Challenges and Recommendations
  6. 01.02.2011: Resilience Metrics and Measurements: Technical Report
  7. 02.02.2011:Bittersweet cookies. Some security and privacy considerations
  8. 16.02.2011: EISAS Roadmap
  9. 18.02.2011: Privacy, Accountability and Trust – Challenges and Opportunities
  10. 28.02.2011: Who is Who-Directory 2011
  11. 07.03.2011: Botnets: 10 Tough Questions
  12. 07.03.2011: Botnets: Measurement, Detection, Disinfection and Defence
  13. 08.03.2011: CSIRT Setting up Guide in Chinese
  14. 08.03.2011: CSIRT Setting up Guide in Hindi
  15. 08.03.2011: Mapping security services to authentication levels
  16. 11.04.2011: Resilience of the Internet Interconnection Ecosystem
  17. 15.04.2011: Policy statement
  18. 18.04.2011: Cyber Europe 2010 Report
  19. 20.04.2011:Managing multiple identities
  20. 01.05.2011: Secure Software Engineering Initiatives
  21. 31.07.2011: A Security Analysis of Next Generation Web Standards
  22. 10.09.2011: Cyber-bullying and online grooming: helping to protect against the risks
  23. 12.09.2011: Appstore security: 5 lines of defence against malware
  24. 01.10.2011:Good Practice Guide on Cooperatve Models for Effective PPPs
  25. 01.10.2011: Desktop Reserach on Public Private Partnerships
  26. 11.11.2011: To log or not to log? - Risks and benefits of emerging life-logging applications
  27. 25.11.2011: Smartphone Secure Development Guidelines
  28. 07.12.2011: Proactive detection of network security incidents, report
  29. 07.12.2011: Proactive detection of network security incidents, CERT survey analysis
  30. 14.12.2011:European Month of Network and Information Security for All - A feasibility study (EN)
  31. 14.12.2011: Protecting Industrial Control Systems. Recommendations for Europe and Member States
  32. 14.12.2011: Annex I: Desktop Research Results
  33. 14.12.2011: Annex II. Survey and Interview Analysis
  34. 14.12.2011: Annex III. ICS Security Related Standards, Guidelines and Policy Documents
  35. 14.12.2011: Annex IV. ICS Security Related Initiatives
  36. 14.12.2011: Annex V. Key Findings
  37. 14.12.2011: Annex VI. Minutes of the Workshop
  38. 14.12.2011: EISAS Basic toolset
  39. 14.12.2011: EISAS (enhanced) report on implementation
  40. 16.12.2011:A flair for sharing - encouraging information exchange between CERTs
  41. 19.12.2011: Cyber Security Aspects in the Maritime Sector
  42. 19.12.2011:Mutual Aid Agreements
  43. 20.12.2011: Trust and Reputation Models
  44. 20.12.2011: The Use of Cryptographic Techniques in Europe
  45. 20.12.2011:CERT Operational Gaps and Overlaps
  46. 21.12.2011: Survey and analysis of security parameters in cloud SLAs across the European public sector
  47. 21.12.2011: Technologies with potential to improve the resilience of the Internet infrastructure
  48. 21.12.2011: Secure Communication with the CERTs & Other Stakeholders
  49. 21.12.2011: Ontology and taxonomies of resilience