Content |
2020: The European regulator issued the report on pro-active detection of incidents
European Network and Information Security Agency (ENISA) published in May, 2020 the report[1] and the accompanying repository, information devoted to measures and sources which can help experts in security, IT-operators and critical infrastructure in the European Union countries beforehand to detect incidents of network security. The document is directed to assessment of methods, tools, actions and sources of information for pro-active detection of incidents[2].
Anticipatory (pro-active) detection is an advance detection of harmful actions using the internal instruments of monitoring or external sources providing data on incidents.
"A project objective is providing the complete list of all available methods, tools, actions and sources of information for pro-active detection of incidents of network security which are already used or can be used by groups of reaction in Europe. In the running report available methods, tools, actions and sources of information for pro-active detection of network incidents", the report says. are estimated.
ENISA started this project for the purpose of improvement of process of detection of incidents of network security in EU countries by the way:
- Providing list of available measures and sources of information;
- Determinations of the best practices;
- Recommendations of the possible directions of development.
In the report the analysis of development of pro-active detection of incidents in EU countries is submitted to the period from 2011 to 2019. One of project objectives also is the research of the new areas capable to improve operational cooperation and information exchange. A project deliverable are three reports and the repository placed on GitHub.
2017
Transformation of ENISA into the all-European center of cyber security
In September, 2017 it became known of plans of the European Union to broaden the state and to increase financing to Information Security Agency of ENISA, having turned it into the all-European center for protection of a cyberspace of Europe.
The budget - to 23 million euros a year is going to increase staff from 84 to 125 people. As noted in material of Euronews, ENISA will be engaged including "active defense". It can mean response cyber attacks in case of attempt at network security of the European Union countries. [3]
The European Commissioner for digital economy Maria Gabriel reminded of danger which is constituted by cyber attacks:
Today they [hackers] can get our economy, influence our private life, interfere with our democracy, – quote Euronews of a word of Gabrielle. – Therefore it is important to take specific steps forward, to develop the general approach, to improve coordination to give to confidence in the security to citizens and the industry of member states. |
In the last several weeks in the EU intesivny discussions about creation of the permanent all-European agency of cyber security which will be engaged in collective defense of the European cyberspace are conducted.
The ENISA agency was created in 2004; its full functioning began on September 1, 2005. Unlike all other agencies of the European Union, ENISA has no permanent mandate, - its powers and the budget are subject to regular revision though in recent years allocations, as a rule, grew. Now it is about creation of the permanent European agency on cyber security which will provide protection of the European networks.
In Europe reasonably are afraid that cyber attacks can pose a threat of life and to human health, and not just machines. Considering regularity of cyber attacks to the European enterprises and the organizations of all sizes including relating to critical infrastructure, creation of the all-European agency look very timely. According to the estimates of European Commission, last year in the EU occurred on average in day of 4 thousand attacks of encoders racketeers, 80% of the European companies experienced at least one violation of cyber security.
To the updated agency it is also going to assign functions on the organization and holding the all-European cyberexercises. ENISA several times gave support to such exercises, and will do it on a permanent basis now. Operational dissemination of data on a status of information infrastructure of the EU and creation of the all-European certificates for the entrusted networks and devices of Internet of Things in different spheres, from power to transport will also become a task of the agency.
Creation of the similar organization is a consequence of the fact that the number of cyberthreats constantly grows — Oleg Galushkin, the information security expert of SEC Consult Services company believes. – Also their potential disruptiveness grows. Successful cyber attack to the enterprise of critical infrastructure can lead to the effects comparable to large terrorist attack today. Prevention of similar – the general task as state, so the private sector. |
The president of the European Commission Juncker suggested to create the European agency of cyber defense
The president of the European Commission Jean-Claude Juncker suggested to create the European agency of cyber defense which will protect EU countries and the European companies from information threats in September, 2017. The offer was read within the plenary session of European Parliament in Strasbourg, RIA Novosti reports.
The head of European Commission said about insufficient security of EU member states from cyberthreats during the speech. Cyber attacks can represent for democracy and stability big threat, than guns and tanks as in Network there is no concept of frontiers, he noted.
According to Juncker, only for last year in EU countries more than 4 thousand cyber attacks were recorded. About 80% of the European companies faced different cyberthreats. At the moment the European Commission looks for solutions of problems with cyber security.
See Also
- Censorship on the Internet. World experience
- Censorship (control) on the Internet. Experience of China
- Censorship (control) on the Internet. Experience of Russia, Roskomnadzor
- Law on regulation of Runet
- VPN and privacy (anonymity, anonymizers)
- Protection of critical information infrastructure of Russia
- Law On security of critical information infrastructure of the Russian Federation
- National Biometric Platform (NBP)
- Single Biometric System (SBS) of these clients of banks
- Biometric identification (market of Russia)
- Directory of solutions and projects of biometrics
- Digital economy of Russia
- Information security of digital economy of Russia
- SORM (System for Operative Investigative Activities)
- State detection system, warnings and mitigations of consequences of the computer attacks (State system of detection, prevention and elimination of consequences of computer attacks)
- National filtering system of Internet traffic (NASFIT)
- Yastreb-M Statistics of telephone conversations
- How to bypass Internet censorship of the house and at office: 5 easy ways
- The auditor - a control system of blocking of the websites in Russia
- The Single Network of Data Transmission (SNDT) for state agencies (Russian State Network, RSNet)
- Data network of public authorities (SPDOV)
- Single network of telecommunication of the Russian Federation
- Electronic Government of the Russian Federation
- Digital economy of Russia
- Cyber crime in the world
- Requirements of a NIST
- Global index of cyber security
- Cyber wars, Cyber war of Russia and USA
- Cyber crime and cyber conflicts: Russia, FSB, National coordination center for computer incidents (NKTsKI), Information Security Center (ISC) of FSB, Management of K BSTM of the Ministry of Internal Affairs of the Russian Federation, Ministry of Internal Affairs of the Russian Federation, Ministry of Defence of the Russian Federation, National Guard of the Russian Federation
- Cyber crime and cyber conflicts: Ukraine
- Cyber crime and cyber conflicts: USA, CIA, NSA, FBI, US Cybercom, U.S. Department of Defense, NATO, Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA)
- Cyber crime and cyber conflicts: Europe, ENISA
- Cyber crime and cyber conflicts: Israel
- Cyber crime and cyber conflicts: Iran
- Cyber crime and cyber conflicts: China
- As the USA spied on production of chips in the USSR
- Security risks of communication in a mobile network
- Information security in banks
- Digital transformation of the Russian banks
- Overview: IT in banks 2016
- The policy of the Central Bank in the field of data protection (cyber security)
- Losses of the organizations from cyber crime
- Losses of banks from cyber crime
- Trends of development of IT in insurance (cyberinsurance)
- Cyber attacks
- Overview: Security of information systems
- Information security
- Information security (world market)
- Information security (market of Russia)
- The main trends in data protection
- Software for data protection (world market)
- Software for data protection (the market of Russia)
- Pentesting (pentesting)
- Cybersecurity - Means of enciphering
- Cryptography
- VPN - Virtual private networks
- Security incident management: problems and their solutions
- Authentication systems
- Law on personal data No. 152-FZ
- Personal data protection in the European Union and the USA
- Quotations of user data in the market of cybercriminals
- Jackpotting
- Virus racketeer (encoder)
- WannaCry (virus racketeer)
- Petya/ExPetr/GoldenEye (virus racketeer)
- Malware (malware)
- APT - Targeted or target attacks
- DDoS and DeOS
- Attacks on DNS servers
- DoS-attacks on content delivery networks, CDN Content Delivery Network
- How to be protected from DDoS attack. TADetails
- Rootkit
- Fraud Detection System (fraud, fraud, fraud detection system)
- Solutions Antifraud directory and projects
- How to select an antifraud system for bank? TADetails
- Security Information and Event Management (SIEM)
- Directory of SIEM solutions and projects
- Than a SIEM system is useful and how to implement it?
- For what the SIEM system is necessary and as it to implement TADetails
- Intrusion detection and prevention systems
- Reflections of local threats (HIPS)
- Confidential information protection from internal threats (IPC)
- Phishing, DMARC, SMTP
- Trojan
- Botha's botnet
- Backdoor
- Worms Stuxnet Regin
- Flood
- Information loss preventions (DLP)
- Skimming (shimming)
- Spam
- Sound attacks
- Antispam software solutions
- Classical file infectors
- Antiviruses
- Cybersecurity: means of protecting
- Backup system
- Backup system (technologies)
- Backup system (security)
- Firewalls