ENISA
Hier finden Sie die Studien der ENISA vom Jahr 2006 bis zum Jahr 2016.
Weitere Studien finden Sie unter https://it-sicherheit.de/enisa-studien/.
ENISA Publikationen 2016
- 2016-04_Common_practices_of_EU-level_crisis_management_and_applicability_to_the_cyber_crises.pdf
- 2016-03_Strategies_for_incident_response_and_cyber_crisis_cooperation.pdf
- 2016-03_Security_incidents_indicators_-_measuring_the_impact_of_incidents_affecting_electronic_communications.pdf
- 2016-03_Impact_Assessment_Art_13a_Incident_Reporting.pdf
- 2016-02_NIS_Directive_and_national_CSIRTs.pdf
- 2016-01_Stocktaking-_Analysis_and_Recommendations_on_the_protection_of_CIIs.pdf
- 2016-01_Report_on_information_sharing_and_common_taxonomies_between_CERTs_and_Law_Enforcement.pdf
- 2016-01_Good_practice_guide_on_vulnerability_disclosure.pdf
- 2016-01_Cyber_Security_and_Resilience_of_Intelligent_Public_Transport.pdf
Publikationen 2015
- 2015-12_Study_on_the_availability_of_trustworthy_online_privacy_tools_for_the_general_public.pdf
- 2015-12_Stocktaking_on_Exercises.pdf
- 2015-12_State-of-the-art_analysis_of_data_protection_in_big_data_architectures.pdf
- 2015-12_Security_and_Resilience_of_Smart_Home_Environments.pdf
- 2015-12_Security_and_Resilience_in_eHealth_Infrastructures_and_Services.pdf
- 2015-12_Secure_Use_of_Cloud_Computing_in_the_Finance_Sector.pdf
- 2015-12_Regulatory_and_Non-regulatory_Approaches_to_Information_Sharing.pdf
- 2015-12_Proposal_for_Article_19_Incident_reporting.pdf
- 2015-12_Information_security_and_privacy_standards_for_SMEs.pdf
- 2015-12_European_Cyber_Security.pdf
- 2015-12_Analysis_of_ICS-SCADA_Cyber_Security_Maturity_Levels_in_Critical_Sectors.pdf
- 2015-10_Report_education.pdf
- 2015-09_Supply_Chain_Integrity.pdf
- 2015-09_Guideline_on_Threats_and_Assets_v_1_2.pdf
- 2015-09_Cyber_Europe_2014_After_Action_Report_PUBLIC.pdf
- 2015-08_Annual_Incident_Reports_2014.pdf
- 2015-04_Technical_Guideline_on_Security_measures_for_Article4_-_Article13a.pdf
- 2015-04_EP3R_2009-2013_Future_of_NIS_Public_Private_Cooperation.pdf
- 2015-04_Cloud_Security_Guide_for_SMEs.pdf
- 2015-04_Auditing_framework_for_trust_services.pdf
- 2015-03_Standardisation_-_eIDAS.pdf
- 2015-03_Regular_update_of_201cBaseline_capabilities201d.pdf
- 2015-03_Good_practice_material_for_first_responders.pdf
- 2015-02_Threat_Landscape_and_Good_Practice_Guide_for_Smart_Home_and_Converged_Media.pdf
- 2015-02_Security_Framework_for_Governmental_Clouds.pdf
- 2015-02_Methodologies_for_the_identification_of_Critical_Information_Infrastructure_assets_and_services.pdf
- 2015-02_ECSM_2014_deployment_report.pdf
- 2015-02_Certification_Schemes_at_European_level_for_Cyber_Security_Skills_of_ICS_SCADA.pdf
- 2015-01_Threat_Landscape_and_Good_Practice_Guide_for_Internet_Infrastructure.pdf
- 2015-01_Standards_and_tools_for_exchange_and_processing_of_actionable_information.pdf
- 2015-01_Privacy_and_Data_Protection_by_Design.pdf
- 2015-01_Network_and_Information_Security_in_the_Finance_Sector.pdf
- 2015-01_ENISA_Threat_Landscape_2014.pdf
- 2015-01_Actionable_Information_for_Security_Incident_Response.pdf
Publikationen 2014
- 2014-12_Smart_Grid_Security_Certification_in__Europe.pdf
- 2014-12_Security_Guide_for_ICT_Procurement.pdf
- 2014-12_Secure_ICT_Procurement_in_Electronic_Communications.pdf
- 2014-12_Impact_Analysis_and_Roadmap.pdf
- 2014-12_Protection_of_Underground_Electronic_Communications_Infrastructure.pdf
- 2014-11_Study_on_cryptographic_protocols.pdf
- 2014-11_Scalable_and_Accepted_Methods_for_Trust_Building.pdf
- 2014-11_Report_on_Cyber_Crisis_Cooperation_and_Management.pdf
- 2014-11_Good_practice_guide_on_training_methodologies.pdf
- 2014-11_Cyber_Security_competition_status_in_Europe.pdf
- 2014-11_An_evaluation_framework_for_cyber_security_strategies.pdf
- 2014-11_Algorithms-_key_size_and_parameters_report__-_2014.pdf
- 2014-10_Roadmap_for_NIS_education_programmes_in_Europe.pdf
- 2014-10_PPPs_and_their_role_in_NIS_Education.pdf
- 2014-10_Article_13a_ENISA_Technical_Guideline_On_Security_Measures_v2_0.pdf
- 2014-10_Article_13a_ENISA_Technical_Guideline_On_Incident_Reporting_v2_1.pdf
- 2014-09_Shellshock.pdf
- 2014-04_Heartbleed.pdf
- 2014-02_Brokerage_model_for_Network_and_Information_Security_in_Education.pdf
- 2014-02_Large_scale_UDP_attacks.pdf
- 2014-01_Risks_of_using_discontinued_software.pdf
Publikationen 2013
- 2013-12_ICS-CERC_considerations.pdf
- 2013-12_Incident_reporting_for_cloud_computing.pdf
- 2013-12_MARIE_Phase_2_Report.pdf
- 2013-12_On_the_security-_privacy_and_usability_of_online_seals._An_overview_.pdf
- 2013-12_Power_Supply_Dependencies_in_the_Ecomms_Sector.pdf
- 2013-12_Recommendations_for_TSPs_-_Risk_assessment.pdf
- 2013-12_Trusted-Services_in_EU.pdf
- 2013-12_Recommendations_for_TSPs_-_Security_framework.pdf
- 2013-12_Window_of_Exposure__a_real_problem_for_SCADA_systems.pdf
- 2013-12_Article_4_Proposal_for_one_security_framework_1_0.pdf
- 2013-12_CERT_communities.PDF
- 2013-12_Data_breach_severity_methodology_1.0.pdf
- 2013-12_eGov-Trustd-Servc.pdf
- 2013-12_eIDAS4eFinance_ePay.pdf
- 2013-12_EISAS_Deployment_feasibility_study.pdf
- 2013-12_EP3R_-_PP.TF.IncidentMgmt.MutualAidStrategies.pdf
- 2013-12_EP3R_-_PP.TF.TermDef.CatAssets.pdf
- 2013-12_ENISA_Threat_Landscape_2013.pdf
- 2013-12_EP3R_-_PP.TF.TrustedInfSharing.pdf
- 2013-12_Good_practices_for_an_EU_ICS_testing_coordination_capability.pdf
- 2013-12_Recommendations_for_TSPs_-_Security_incidents.pdf
- 2013-12_Roadmap_for_European_Cyber_Security_Month_activities.pdf
- 2013-12_Securing_personal_data_in_the_context_of_data_retention._Recommendations.pdf
- 2013-12_Smart_Grid_Threat_Lanscape.pdf
- Recommendations for a methodology of the assessment of severity of personal data breaches
- 2013-11_Good_Practice_Guide_on_National_Risk_Assessment_and_Threat_Modelling.pdf
- 2013-11_National_Roaming_for_Resilience.pdf
- 2013-11_Good_Practice_Guide_for_securely_deploying_Governmental_Clouds.pdf
- 2013-11_Security_certification_practice_in_the_EU._A_case_study.pdf
- 2013-11_8th_Annual_CERT_workshop_report.pdf
- 2013-11_Good_Practice_Collection_for_CERTs_on_the_Directive_on_attacks_against_information_systems.pdf
- 2013-11_Detect-_SHARE-_Protect.pdf
- 2013-11_AlertsWarningsAnnouncements_final.pdf
- 2013-10_ENISA_-_Can_we_learn_from_SCADA_security_incidents_-_White_Paper.pdf
- 2013-10_Schemes_for_Auditing_Security_Measures.pdf
- 2013-10_Cybersecurity_cooperation.pdf
- 2013-10_Report_on_Second_International_Conference_on_Cyber-crisis_Cooperation_and_Exercises.pdf
- 2013-10_Algorithms-_Key_Sizes_and_Parameters_Report._2013_recommendations.pdf
- 2013-09_ENISA_Threat_Landscape_Mid-year_2013.pdf
- 2013-08_Annual_Incident_Reports_2012.pdf
- 2013-04_Flash_Note_.pdf
- 2013-04_Securing_personal_data._Recommended_cryptographic_measures.pdf
- 2013-03_Flash_Note_-_Cyber_Attacks.pdf
- 2013-02_Critical_Cloud_Computing_V_1_0.pdf
- 2013-01_ENISA_Threat_Landscape_Published.pdf
Publikationen 2012
- 2012-12_7th_ENISA_CERT_Workshop_Report.pdf
- 2012-12_Be_Aware_Be_Secure_Synthesis_of_the_results_of_the_first_European_Cyber_Security_Month_FINAL.pdf
- 2012-12_CERT_Baseline_Capabilities-status_report.pdf
- 2012-12_CERT_Baseline_Capabilities-updated_recommendations.pdf
- 2012-12_COIT_Mitigation_Stategies.pdf
- 2012-12_Cyber_Europe_2012_-_Key_Findings_Report.pdf
- 2012-12_Digital_Frontline.pdf
- 2012-12_EISAS_Large_Scale_pilot-final.pdf
- 2012-12_Emergency_Communications_Stocktaking.pdf
- 2012-12_ENISA_Appropriate_security_measures_for_Smart_Grids_Final.pdf
- 2012-12_ENISA_Guidebook_on_National_Cyber_Security_Strategies_Final.pdf
- 2012-12_Implementation_of_Article_15.pdf
- 2012-12_NIS.Education.2012.December.pdf
- 2012-12_Report_on_Annual_Privacy_Forum_2012.pdf
- 2012-12_Return_On_Security_Investment.pdf
- 2012-12_Roadmap_to_provide_more_proactive_and_efficient_Computer_Emergency_Response_Team_training.pdf
- 2012-11_Privacy_considerations_of_online_behavioural_tracking.pdf
- 2012-11_Good_practice_guides_for_CERTs_in_addressing_legal_and_operational_NIS_aspects_of_cybercrime.pdf
- 2012-11_The_right_to_be_forgotten_-_between_expectations_and_practice.pdf
- 2012-11_ENISA_Honeypots_study.pdf
- 2012-11_Involving_Intermediaries_in_Cyber_security_Awareness_Raising.pdf
- 2012-10_ENISA_Cyber-Exercises_Analysis_Report-v1.0.pdf
- 2012-10_Consumerization_of_IT_-_Top_Risks_and_Opportunities.pdf
- 2012-10_AnnualSummaryReport2011_ENISA_FINAL.pdf
- 2012-10_EISAS_enhanced_roadmap.pdf
- 2012-08_Cyber_Incident_Reporting_in_the_EU_FINAL.pdf
- 2012-07_Smart_Grid_Security-ENISA_Recommendations.pdf
- 2012-07_FlashNotePasswords.pdf
- 2012-06_ENISA_Report_on_Resilient_Internet_Interconnections.pdf
- 2012-06_The_threat_from_Flamer.pdf
- 2012-06_Cyber-Insurance-Market.pdf
- 2012-05_Art4_tech.pdf
- 2012-05_National_Cyber_Security_Strategies.pdf
- 2012-04_ProcureSecure.pdf
- 2012-02_Cooperation_between_CERTs_and_LEAs_in_the_fight_against_cybercrime.pdf
- 2012-02_monetising_privacy.pdf
- 2012-02_data_collection_and_storage.pdf
- 2012-01_Network_Information_Security_in_Education.EN.pdf
Publikationen 2011
- 2011-12_proactive_detection_report.pdf
- 2011-12__ENISA_Analysis_of_cyber_security_aspects_in_the_maritime_sector_1_0.pdf
- 2011-12_CryptoStudy.pdf
- 2011-12_resilient_technologies.pdf
- 2011-12_ReportOnTrustAndReputationModelsFinal.pdf
- 2011-12_survey_analysis.pdf
- 2011-12_EISAS_Basic_Toolset.pdf
- 2011-12_MARIE_Phase_1_Report_v1.1.pdf
- 2011-12_SLA_Survey_Report.pdf
- 2011-12_Secure_Communication_Concise_Report.pdf
- 2011-12_Annex_IV.pdf
- 2011-12_Annex_VI.pdf
- 2011-12_Annex_V.pdf
- 2011-12_Annex_III.pdf
- 2011-12_Annex_II.pdf
- 2011-12_Annex_I.pdf
- 2011-12_ENISA_-_Protecting_Industrial_Control_Systems_-_Recommendations_for_Europe_and_Member_States.pdf
- 2011-12_EISAS_report_on_implementation.pdf
- 2011-12_legal_aspects_cert_study.pdf
- 2011-12_ontology_taxonomies.pdf
- 2011-11_Life-logging_Risk_Assessment_Final_Report.pdf
- 2011-11_Secure_Dev_Guidelines.pdf
- 2011-12_CERT_operational_gaps_and_overlaps_report_2011.pdf
- 2011-10_ENISA_Good_Practice_Guide.pdf
- 2011-10_ENISA_Desktop_Research_report.pdf
- 2011-09_Final_v3.3.pdf
- 2011-09_ENISA_Smartphone_Security_Appstores_v28.pdf
- 2011-07_NG_Web_Security.pdf
- 2011-05_L3SSE__Final_Report_13May2011.pdf
- 2011-12_European_month_of_network_and_information_security_for_all_FINAL.pdf
- 2011-04_Managing_Multiple_Identities.pdf
- 2011-04_Inter-X_Full_Report_April-11b.pdf
- 2011-04_ENISA_Cyber_Europe_2010_report.pdf
- 2011-04_botnets_policy_statement_ENISA.pdf
- 2011-03_mapping.pdf
- 2011-03_ENISA_Botnets_Measurement_Defence.pdf
- 2011-03_CSIRT_setting_up_guide_ENISA-CN-MAN.pdf
- 2011-03_CSIRT_setting_up_guide_ENISA-HI.pdf
- 2011-03_Botnets_10_tough_questions.pdf
- 2011-02_Who-is-Who_2011-1.pdf
- 2011-02_PAT_study.pdf
- 2011-02_Measurement_Frameworks_-_Metrics_normal_version.pdf
- 2011-02_ENISA_-_Measurement_Frameworks_and_Metrics_for_Resilient_Networks_and_Services_v6_2.pdf
- 2011-02_EISAS_Roadmap_FINAL.pdf
- 2011-02_Cookies.pdf
- 2011-01_Data_breach_notifications.pdf
- 2011-01_End2end_resilience.pdf
- 2011-01_pat-survey.pdf
- 2011-01_Security_-_Resilience_in_Governmental_Clouds_ENISA.pdf
Publikationen 2010
- 2010-12_Incident_Management_guide.pdf
- 2010-12_ENISA_Smartphone_Security.pdf
- 2010-12_Flyer.pdf
- 2010-12_Baseline_capability_Policy_Recommendations.pdf
- 2010-09_ENISA_Incentives_and_Challenges.pdf
- 2010-04_procent.pdf
- 2010-04_Annex_I_-_Scenario_Building_-_Analysis.pdf
- 2010-04_Mobile_IDM.pdf
- 2010-04_IoT-RFID_Scenario_Risk_Assessment_Final_Report.pdf
- 2010-03_Good_practices_guide_for_deploying_DNSSEC_finalV2.pdf
- 2010-03_Example_BCP_AnnexK-AssetIdentificationCards.pdf
- 2010-03_ENISA_BCM_for_SMEs_V1_0.pdf
- 2010-03_ENISA_EFR_Framework_Introductory_Manual.pdf
- 2010-03_BCM_for_SME_Example_BCP-Template.pdf
- 2010-03_BCM_for_SMEs_Annexes_G-H_Assessment_Templates.pdf
- 2010-02_XBorderAuth.pdf
- 2010-02_Behavioural_Biometrics__Final.pdf
- 2010-05_ENISA_Who_is_Who_NIS_2010.pdf
- 2010-01_Mapping_security_services.pdf
Publikationen 2009
- 2009-12_Reporting_Security_Incidents_-_Good_Practices.pdf
- 2009-12_National_Exercises_Good_Practice_Guide.pdf
- 2009-12_baseline-capabilities-v1.0.pdf
- 2009-11_SURVEY_An_SME_perspective_on_Cloud_Computing.pdf
- 2009-11_eID_online_banking.pdf
- 2009-11_Cloud_Computing_Security_Risk_Assessment.pdf
- 2009-11_Cloud_Computing_Information_Assurance_Framework.pdf
- 2009-06_Final_NSIE.pdf
- 2009-01_enisa_privacy_features_eID.pdf