Cyber Security and Resilience of Intelligent Public Transport. Good practices and recommendations
This study proposes a pragmatic approach that will highlight the critical assets of Intelligent Public Transport systems. It gives an overview of the existing security measures (good practices) that could be deployed to protect these critical assets…
Architecture model of the transport sector in Smart Cities
The main objective of this study is to model the architecture of the transport sector in SCs and to describe good cyber security practices of IPT operators. The good practices are put into a relationship with different city maturity levels. This…
CSIRT Capabilities. How to assess maturity? Guidelines for national and governmental CSIRTs
This report focuses on the maturity of national and governmental Computer Security and Incident Response Teams (CSIRTs) and the Trusted Introducer1 certification scheme for CSIRTs as an indicator of the maturity level of teams. The issues covered…
Security and Resilience in eHealth Infrastructures and Services
The aim of this study is to investigate the approaches and measures MS take to protect critical healthcare systems, having as a main goal improved healthcare and patient safety. In that respect this study analyses:
- The policy context in Europe and…
Privacy by design in big data
The extensive collection and further processing of personal information in the context of big data analytics has given rise to serious privacy concerns, especially relating to wide scale electronic surveillance, profiling, and disclosure of private…
Online privacy tools for the general public
ENISA has published a study in the area of PETs for the protection of online privacy (online privacy tools) with two main objectives: a) to define the current level of information and guidance that is provided to the general public and b) to provide…
Cyber Security Information Sharing: An Overview of Regulatory and Non-regulatory Approaches
This study aims to present the regulatory and non-regulatory approaches of EU Member States as well as EEA and EFTA countries to share information on cyber incidents, the different sector regulation challenges of managing cyber security issues, and…
European Cyber Security Month 2015 - Deployment Report
ECSM 2015 focused on Member States of the EU and EU partners. The project life cycle included coordinators calls, face-to-face meetings, periodic news updates, European Kick-off event, trainings and education seminars, website resources and weekly…
Latest Report on National and International Cyber Security Exercises
During this study ENISA gathered and analysed a large set of over 200 exercises.
In addition to the exercise dataset, ENISA analysed specialised literature such as after-action reports and previous studies that have contributed to the analysis.…
Analysis of ICS-SCADA Cyber Security Maturity Levels in Critical Sectors
This study reveals the current maturity level of ICS-SCADA cyber security in Europe and identifies good practices used by European Member States to improve this area. The first and second part of this study introduces us to the ICS-SCADA cyber…
Pagination