Cybersecurity Best Practices 2018
DOI: 10.1007/978-3-658-21655-9_5
|View full text |Cite
|
Sign up to set email alerts
|

ENISA’s Contribution to National Cyber Security Strategies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“… National cybersecurity strategies and reference reports : Documents regarding the currently applied cybersecurity strategies in the pilot countries and relevant reports (e.g. regarding guidelines or best practices) primarily provided by the European Union Agency for Network and Information Security (ENISA) [ 17 , 18 ]. …”
Section: Methodsmentioning
confidence: 99%
“… National cybersecurity strategies and reference reports : Documents regarding the currently applied cybersecurity strategies in the pilot countries and relevant reports (e.g. regarding guidelines or best practices) primarily provided by the European Union Agency for Network and Information Security (ENISA) [ 17 , 18 ]. …”
Section: Methodsmentioning
confidence: 99%
“…As a common challenge for all EHR providers, the security risk is a core topic of research, especially given the complex nature of healthcare systems. Relying on human vigilance alone is not a practical method for security records (Millard, 2017); as reflected in a report by the European Union Agency for Network and Information Security (ENISA), which outlines how cyber-attacks on e-health systems have a high societal impact (Liveri, Sarri, & Skouloudi, 2015). New systems are needed for safeguarding EHRs.…”
Section: Ehr Securitymentioning
confidence: 99%
“…Four-stage cycle of action based on the PDCA model involves control and continuous improvement of the strategy, policy and products in the domain of cyberspace protection. On this basis, ENISA proposes four, cyclically repeating stages of programme management starting from its development, execution, evaluation and adjustment [16].…”
Section: Assumptions Of the Pdca Model In Cyberspace Protectionmentioning
confidence: 99%
“…The evaluation phase is the key element of the functioning of the national programme of cyberspace protection. The planned, systematised and cyclical evaluation supports the achievements of the programme objectives and contributes to its continuous development [16]. Conducting the evaluation, we need to provide the information about its results to all the entities involved in the cyberspace protection.…”
Section: Assumptions Of the Pdca Model In Cyberspace Protectionmentioning
confidence: 99%