Tools & Publications

Lessons learnt, outcomes and research for and about international cyber capacity building.

  • Themes & Topics

  • Tags

  • Type

  • Year

  • Actor

  • Clear all

Showing 466-480 of 537 results

   
   
Tool

Global Prosecutors E-Crime Network and Library

Authors

Year

  • 2019

Description

  • Under the umbrella of the International Association of Prosecutors (IAP) the Global Prosecutors E-Cr…

 

Tool

Global Good Practices – Coordinated Vulnerability Disclosure (CVD)

Authors

Year

  • 2017

Description

  • The unprecedented uptake of information and operational/industrial control system technologies (IT a…

 

Tool

Mauritius Cybercrime Online Reporting System (MAUCORS)

Authors

Year

  • 2019

Description

  • The Mauritian Cybercrime Online Reporting System (MAUCORS) is a national online system that allows t…

 

Tool

Stimulate Local Ownership of Capacity Building Programmes through National Project Teams

Authors

Year

  • 2017

Description

  • How can international and regional forums, donors, and development agencies stimulate local ownershi…

 

Tool

Combatting Cybercrime: Tools and Capacity Building for Emerging Economies

Authors

Year

  • 2016

Description

  • This tool, Combatting Cybercrime, includes an online Assessment Tool that enables countries to more …

 

Tool

TITANIUM: Tools for the Investigation of Transactions in Underground Markets

Authors

Year

  • 2017

Description

  • TITANIUM will research, develop, and validate novel data-driven techniques and solutions designed to…

 

Tool

Education for Justice (E4J) Module Series on Cybercrime

Authors

Year

  • 2019

Description

  • Cybercrime is a growing, global problem. Whether you are a small business, a fortune 500 company, bu…

 

Tool

DMARC Authentication Tool

Authors

Year

  • 2013

Description

  • The purpose of this tool is to guide your organization through the process of creating a DMARC polic…

 

Tool

UNODC Cybercrime Repository

Authors

Year

  • 2019

Description

  • The cybercrime repository is a central data repository of cybercrime laws and lessons learned for th…

 

Tool

Budapest Convention on Cybercrime

Authors

Year

  • 2001

Description

  • The Convention is the first international treaty on crimes committed via the Internet and other comp…

 

Tool

Malabo Convention on Cyber Security and Personal Data Protection

Authors

Year

  • 2014

 

Tool

Cyberguide

Authors

Year

  • 2019

Description

  • Contains information on defining your cyber security strategy and politics, managing your assets, im…

 

Tool

Baseline Information Security Guidelines

Authors

Year

  • 2018

Description

  • The Baseline Security Guidelines (BSG) provide minimum guidelines for the implementation or evaluati…

 

Tool

Internet.nl

Authors

Year

  • 2019

Description

  • Modern Internet Standards provide for more reliability and further growth of the Internet. This tool…

 

Tool

Aioti High Level Architecture Functional Model

Authors

Year

  • 2018

Description

  • In the context of the AIOTI WG03 and by following the evolution on IoT Architectural aspects and ava…

 

57

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.