Tools & Publications

Lessons learnt, outcomes and research for and about international cyber capacity building.

  • By themes & topics

  • Clear all

Showing 496-510 of 538 results

   
   
Tool

Cybersecurity Survival Guide

Authors

Year

  • 2019

Description

  • This guide is divided into the following modules: Module 1: Cybersecurity Foundation explains the na…

 

Cybersecurity Survival Guide

This guide is divided into the following modules: Module 1: Cybersecurity Foundation explains the nature and scope of today’s cybersecurity challenges. This module explores the cybersecurity landscape, cyberthreats, malware and spamming, and Wi-Fi and advanced threats. Module 2: Cybersecurity Gateway explains networking concepts, fundamentals, and technologies. This module explores the […]

Tool

Cybersecurity Awareness Campaign Toolkit

Authors

Year

  • 2015

Description

  • This toolkit is designed to provide governments or organizations guidance and resources for developi…

 

Cybersecurity Awareness Campaign Toolkit

This toolkit is designed to provide governments or organizations guidance and resources for developing a cybersecurity awareness campaign. Our goal is to help you think through your country’s needs for a cybersecurity awareness campaign and how to best achieve it whether you have aw large budget or limited resources. We […]

Tool

Focus Awareness-Building Through a Cybersecurity Awareness Month

Authors

Year

  • 2017

Description

  • The National Cybersecurity Awareness Month (NCSAM) is an example of a cybersecurity awareness campai…

 

Focus Awareness-Building Through a Cybersecurity Awareness Month

The National Cybersecurity Awareness Month (NCSAM) is an example of a cybersecurity awareness campaign at national level that builds on the attention provided by declaring a month dedicated to a specific topic to mobilise actors; raise the activity profile; and amplify communication, awareness, and capacity building activities. The campaign focuses […]

Tool

Align National Campaigns

Authors

Year

  • 2017

Description

  • Cooperation, alignment, and coordination with others is beneficial. In planning and organising an aw…

 

Align National Campaigns

Cooperation, alignment, and coordination with others is beneficial. In planning and organising an awareness campaign, it is advisable to coordinate with other existing national and international awareness campaigns. If stakeholders come together to share materials, and possibly align messages, the impact is amplified. Sharing materials and aligning campaign messages helps […]

Tool

IBM X-Force Exchange

Authors

Year

  • 2015

Description

  • IBM® X-Force Exchange is a cloud-based, threat intelligence sharing platform that you can use to ra…

 

IBM X-Force Exchange

IBM® X-Force Exchange is a cloud-based, threat intelligence sharing platform that you can use to rapidly research the latest global security threats, aggregate actionable intelligence, consult with experts and collaborate with peers. IBM X-Force Exchange, supported by human- and machine-generated intelligence, leverages the scale of IBM X-Force to help users […]

Tool

The GFCE-MERIDIAN Good Practice Guide on Critical Information Infrastructure Protection for Governmental Policy-Makers

Authors

Year

  • 2017

Description

  • Critical Information Infrastructure Protection (CIIP) is a complex but important topic for nations. …

 

The GFCE-MERIDIAN Good Practice Guide on Critical Information Infrastructure Protection for Governmental Policy-Makers

Critical Information Infrastructure Protection (CIIP) is a complex but important topic for nations. Nations at large critically depend on Critical Infrastructure (CI) services such as energy supply, telecommunications, financial systems, drinking water, and governmental services. Information and communication technologies(ICT)-based services are becoming increasingly important for the functioning of CI. Disruption […]

Tool

GFCE Global Good Practices – Critical Information Infrastructure Protection (CIIP)

Authors

Year

  • 2017

Description

  • Some elements of ICT have become critical for national security. These elements form the Critical  …

 

GFCE Global Good Practices – Critical Information Infrastructure Protection (CIIP)

Some elements of ICT have become critical for national security. These elements form the Critical  Information Infrastructure (CII) of a nation. Protection of CII (CIIP) has obtained worldwide attention which has, for example, resulted in a OECD high-level policy framework (2008) containing recommendations on the Protection of Critical Information Infrastructure.  […]

Tool

Produce and Present Trusted Metrics about Systemic Risk Conditions

Authors

Year

  • 2017

Description

  • A statistics platform, featuring metrics and data visualisation, allows for the measurement of key i…

 

Produce and Present Trusted Metrics about Systemic Risk Conditions

A statistics platform, featuring metrics and data visualisation, allows for the measurement of key indicators of malicious activity and risk conditions, and enables analytical insight about patterns, priorities, and trends for action. Such intelligence can be used by the CERT/CSIRT community, security sector, corporations, and organisations. If the metrics are […]

Tool

Establish a Clearinghouse for Gathering Systemic Risk Conditions Data in Global Networks

Authors

Year

  • 2017

Description

  • Internet networks are replete with systemic vulnerabilities. CERTs and other trusted  operators req…

 

Establish a Clearinghouse for Gathering Systemic Risk Conditions Data in Global Networks

Internet networks are replete with systemic vulnerabilities. CERTs and other trusted  operators require reliable information about their network’s health over time. Various organisations have set up systems to scan networks for vulnerabilities and/or monitor cyber-attacks. Many of these sources are open, but their provenance and collection processes are often opaque. […]

Publication

Harnessing the Internet of Things for Global Development

Authors

Year

  • 2016

Description

  • This report explores the current use and potential of Internet of Things (IoT) technologies in tackl…

 

Harnessing the Internet of Things for Global Development

This report explores the current use and potential of Internet of Things (IoT) technologies in tackling global development challenges, highlighting a number of specific instances where IoT interventions are helping to solve some of the world’s most pressing issues . It presents summary conclusions on what is required for the […]

Publication

An Internet of Things Reference of Architecture

Authors

Year

  • 2016

Description

  • The Internet of Things (IoT) already helps billions of people. Thousands of smart, connected devices…

 

An Internet of Things Reference of Architecture

The Internet of Things (IoT) already helps billions of people. Thousands of smart, connected devices deliver new experiences to people throughout the world, lowering costs, sometimes by billions ofdollars. Examples include connected cars, robotic manufacturing, smarter medical equipment, smart grid, and countless industrial control systems. Unfortunately, this growth in connected […]

Publication

IoT Security Standards Gap Analysis

Authors

Year

  • 2019

Description

  • This study analyses the gaps and provides guidelines for, in particular, the development or repositi…

 

IoT Security Standards Gap Analysis

This study analyses the gaps and provides guidelines for, in particular, the development or repositioning of standards, facilitating the adoption of standards and governance of EU standardisation in the area of NIS. Source – ENISA website

Publication

IoT Security Whitepaper 2018

Authors

Year

  • 2018

Description

  • In February 2017, Huawei released the white paper Building a Trusted and Managed IoT World with Inst…

 

IoT Security Whitepaper 2018

In February 2017, Huawei released the white paper Building a Trusted and Managed IoT World with Instituto Nacional de Ciberseguridad (INCIBE) and Red.es of Spain at the Mobile Work Congress 2017. In October 2017, Huawei proposed an innovative 3T+1M IoT security architecture to meet E2E security requirements from devices to […]

Publication

International Cyber Norms: Legal, Policy and Industry Perspectives

Authors

Year

  • 2016

Description

  • The book International Cyber Norms: Legal, Policy & Industry Perspectives is a result of a serie…

 

International Cyber Norms: Legal, Policy and Industry Perspectives

The book International Cyber Norms: Legal, Policy & Industry Perspectives is a result of a series of workshops organised by the NATO CCD COE during 2014-2015.1 The aim of the collection of articles is to shed light on the different approaches to ‘cyber norms’ in various research domains. The articles […]

Publication

Confidence Building Measures and International Cybersecurity

Authors

Year

  • 2013

Description

  • The meeting in Zurich took place at an important moment. Recent events have shown that much remains …

 

Confidence Building Measures and International Cybersecurity

The meeting in Zurich took place at an important moment. Recent events have shown that much remains to be done to ensure and strengthen confidence between states and society around the different uses of cyberspace. Meanwhile, mistrust between states regarding the use of cyberspace continues to rise, not least due […]

28

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.