Tools & Publications

Lessons learnt, outcomes and research for and about international cyber capacity building.

  • By themes & topics

  • Clear all

Showing 121-135 of 538 results

   
   
Publication

Kosovo – Law No. 08/L-173 on Cyber Security

Authors

Year

  • 2023

Description

  • The law passed by the Assembly of Kosovo in February 2023 establishes the principles of cyber securi…

 

Kosovo – Law No. 08/L-173 on Cyber Security

The law passed by the Assembly of Kosovo in February 2023 establishes the principles of cyber security, outlines the responsibilities of authorities, and promotes inter-institutional cooperation to prevent and combat cybercrime, ultimately leading to the creation of the Cyber Security Agency. Additionally, the law partially transposes European Union directives (EU) […]

Publication

Kosovo’s National Cybersecurity Strategy (2023 – 2027)

Authors

Year

  • 2023

Description

  • This strategy focuses on advancing legislation and institutional framework, enhancing cybersecurity …

 

Kosovo’s National Cybersecurity Strategy (2023 – 2027)

This strategy focuses on advancing legislation and institutional framework, enhancing cybersecurity awareness, fostering national and international cooperation, supporting private sector development, and embracing public-private partnerships. It also places a strong emphasis on building a sustainable workforce and increasing capabilities in cyber investigation and defence.  

Publication

Emerging Practices in Cybersecurity-Related Public-Private Partnerships and Collaboration in OSCE participating States

Authors

Year

  • 2023

Description

  • This report is the result of research conducted on concrete examples of public-private partnerships …

 

Emerging Practices in Cybersecurity-Related Public-Private Partnerships and Collaboration in OSCE participating States

This report is the result of research conducted on concrete examples of public-private partnerships (PPPs) for cyber/ICT security in OSCE participating States. It presents emerging practices in PPPs as baseline recommendations and organizes them under the rubrics of purpose, policy, process and people. This report could be used as a […]

Publication

Guidelines on cybercrime investigation

Authors

Year

  • 2022

Description

  • This publication serves as a comprehensive guide for understanding and addressing computer-related c…

 

Guidelines on cybercrime investigation

This publication serves as a comprehensive guide for understanding and addressing computer-related crimes, offering guidance from the initial receipt of a crime complaint through the planning of suspect arrests and digital media seizures. It aims to simplify the complexities of technology and the internet for public prosecution offices and law […]

Publication

The role of technology in preventing and combating organized crime, finacial and corruption : international academic conference : book of proceedings

Authors

Year

  • 2022

Description

  • This publication explores various aspects of the intersection between technology and criminal law, c…

 

The role of technology in preventing and combating organized crime, finacial and corruption : international academic conference : book of proceedings

This publication explores various aspects of the intersection between technology and criminal law, covering topics such as corporate criminal liability in the context of new technologies, the use of technology in preventing and investigating economic crimes, cybercrime, and its impact on human rights and privacy. It also delves into issues […]

Publication

Protecting Transnational Critical Information Infrastructure: Vitality, Vulnerability and Diplomacy

Authors

Year

  • 2023

Description

  • This paper considers how the governance of transnational critical information infrastructure (CII) c…

 

Protecting Transnational Critical Information Infrastructure: Vitality, Vulnerability and Diplomacy

This paper considers how the governance of transnational critical information infrastructure (CII) could be approached at the global level. It suggests that when one is thinking about the (potential) governance of CII, it is important to recognise that not all infrastructure that is critical is also necessarily vulnerable

Publication

Western Balkan CERT Cooperation

Year

  • 2021

Description

  • This publication focuses on providing concrete proposals for enhancing cooperation among national Co…

 

Western Balkan CERT Cooperation

This publication focuses on providing concrete proposals for enhancing cooperation among national Computer Security Incident Response Teams (CSIRTs) in the Western Balkans. It addresses questions related to areas of cooperation, successful CSIRT networks, and strategies for improving multilateral cooperation, while considering individual capacities and capabilities of the participating CSIRTs. Additional […]

Publication

Kosovo’s Take on Cybersecurity

Authors

Year

  • 2023

Description

  • This security brief discusses the surge in cybercrimes in Kosovo in 2014 and the subsequent developm…

 

Kosovo’s Take on Cybersecurity

This security brief discusses the surge in cybercrimes in Kosovo in 2014 and the subsequent development of a National Cyber Security Strategy and Action Plan. It highlights the impact of cyberattacks on Kosovo’s economy and societal stability and presents challenges in cybersecurity education, ultimately proposing measures to enhance cybersecurity in […]

Publication

Introduction to Computer Security Incident Response Teams (CSIRTs): Structures and Functions of Cybersecurity’s First Responders

Authors

Year

  • 2024

Description

  • This Guidebook is intended to help, in particular, new employees of Computer Security Incident Respo…

 

Introduction to Computer Security Incident Response Teams (CSIRTs): Structures and Functions of Cybersecurity’s First Responders

This Guidebook is intended to help, in particular, new employees of Computer Security Incident Response Teams (CSIRTs) (though it is likely relevant for existing CSIRT employees) understand the structure of CSIRTs, and clarify the expectations and how they can best be achieved.

Publication

Cybersecurity and Human Rights in the Western Balkans: Mapping Governance and Actors

Authors

Year

  • 2024

Description

  • Description This publication focuses on mapping cybersecurity-related human rights opportunities and…

 

Cybersecurity and Human Rights in the Western Balkans: Mapping Governance and Actors

Description This publication focuses on mapping cybersecurity-related human rights opportunities and challenges in WB. There are six chapters in total, one for each economy in the Western Balkans. Each begins with essential conceptual background information regarding the cybersecurity and human rights contexts of each economy. Finally, they present ways forward, […]

Publication

Geneva Manual on Responsible State Behaviour: Implementation of Norms of Responsible Behaviour in Cyberspace by Relevant Non-State Stakeholders

Authors

Year

  • 2023

Description

  • This document stems from the Geneva Dialogue on Responsible Behaviour in Cyberspace, which investiga…

 

Geneva Manual on Responsible State Behaviour: Implementation of Norms of Responsible Behaviour in Cyberspace by Relevant Non-State Stakeholders

This document stems from the Geneva Dialogue on Responsible Behaviour in Cyberspace, which investigates the consequences of agreed upon norms for relevant non-state stakeholders from the private sector, academia, civil society, and technical community, and tries to clarify their roles and responsibilities. It does not aim to find consensus, but […]

Publication

‘Leapfrogging’ or ‘lagging’?: highlighting critical information infrastructure protection challenges and opportunities in Egypt and Nigeria

Year

  • 2024

Description

  • Emerging economies are experiencing dramatic rises in internet penetration, along with an expansion …

 

‘Leapfrogging’ or ‘lagging’?: highlighting critical information infrastructure protection challenges and opportunities in Egypt and Nigeria

Emerging economies are experiencing dramatic rises in internet penetration, along with an expansion of cyber-dependent critical infrastructure. Nevertheless, in many countries and regions, critical information infrastructure protection (CIIP) efforts remain at a relatively nascent stage. Early and widespread approaches to critical information infrastructure protection are informed by higher income, early […]

Publication

Ghana : A Case Study in Strengthening Cyber Resilience

Authors

Year

  • 2023

Description

  • The case study of Ghana demonstrates that forward-looking investments and policy initiatives based o…

 

Ghana : A Case Study in Strengthening Cyber Resilience

The case study of Ghana demonstrates that forward-looking investments and policy initiatives based on international best-practices can go a long way in boosting cybersecurity capacity in developing countries. Ghana has significantly enhanced its cyber resilience, with an increased capacity to detect, respond to and recover from cybersecurity incidents. The country […]

Tool

CyberPeace Academy

Authors

Year

  • 2024

Description

  • CyberPeace Academy offers either complete beginners or those already on their way of becoming an exp…

 

CyberPeace Academy

CyberPeace Academy offers either complete beginners or those already on their way of becoming an expert a variety of trainings from more general to more specific ones, provided by experts at the CyberPeace Institute. Basic Trainings (1h30min): General Cyber Awareness Training (for NGOs) 90 Minutes to Avoid 90% of Cyber […]

Tool

Methodology to Classify Unsolicited Email Threats

Authors

Year

  • 2024

Description

  • Email, a fundamental form of communication, faces increasing threats from unsolicited messages. Diff…

 

Methodology to Classify Unsolicited Email Threats

Email, a fundamental form of communication, faces increasing threats from unsolicited messages. Differentiating these types of threats is essential to take appropriate mitigation measures and deploy effective security controls. This research delves into the complexities of this issue, examining the diverse categories, inherent threats, and the role of language in […]

403

more brilliant tools and publications this way

Welcome to the AI Chatbot

Hello and welcome!

I'm your AI chatbot, here to assist you with Cybil project data queries. Whether you need information, insights, or help navigating through project details, I'm here to make your experience seamless and efficient. Let's get started!

Please note that I am designed to answer questions and provide information exclusively related to Cybil project data. My responses are generated based on the information available within the projects and are intended to assist with your queries. While I strive for accuracy, the information I provide cannot always be fully guaranteed, and it is advisable to verify certain information as needed.

Dear User,

You have reached the maximum number of questions for today. Kindly visit us again tomorrow for further assistance. We appreciate your understanding and thank you for using our service.

0/20
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.