Survey Questionnaire

 

Questionnaire

Instruction: Please answer the questions as accurate as you can for your responses will be important for the study – it can affect the accuracy and efficiency of the results and findings of the study. All of the data gathered will be solely used for the academic purposes only.

Background Information

Direction: Tick the box which corresponds to your answer

1.       How many computers does your office use?

□             1 – 15                   □             16 – 30

□             31 – 55 □             56 – above

2.       Do you have Internet connection?

□             Yes                         □             No

3.       Are you connected through network?

□             Yes                         □             No

4.       What are your common uses of your computer system?

□             internal communication/information sharing

□             connect with the customers/marketing

□             all business transactions and procedures (finance, accounting, etc.)

□             others: please specify: ____________________________________________________________________________________________________________________________________________________________

 

Computer Security Risks

Direction: Based on your experience as an IT professional, kindly rate the importance and riskiness of different security issues.

5 – very important

4 – important

3 – uncertain

2 – unimportant

1 – very unimportant

Statement

5

4

3

2

1

Physical Security

 

 

 

 

 

1. computer facilities (heating, cooling, dehumidifying, ventilating, lighting and power systems)

2. Theft

3. Unauthorized entrance to the computer facilities

Hardware Security

 

 

 

 

 

4. Changing the hardware setup parameters

5. Theft and substitution of removable devices and other equipment

Software Security

 

 

 

 

 

6. Malicious codes (viruses, malware, etc.)

7. Unauthorized access

Personnel Security

 

 

 

 

 

8. Duties and responsibilities of the employees and the level or degree of their access to computer system

9. Employee espionage and sabotage

10. Errors due to human intervention

11. Correct usage of the computer resources

 

 

 

 

 

Network Security

 

 

 

 

 

12. Delivering data towards the correct recipient on time

13. Eavesdrop

14. Others: please specify:

_________________________________________

_________________________________________

_________________________________________

 

Computer Security Prevention

Direction: Based on your current computer security environment, please rate the importance of the following security prevention policies and activities.

Statement

5

4

3

2

1

Physical Security

 

 

 

 

 

1. Accidents and Disaster Prevention

·         Adequate emergency lighting

·         Fireproof containers for media protection

·         Continuity plan

·         Water/Fire alert systems

2. Anti-theft and Anti-Unauthorized Users

·         Computer Locks

·          Facility Locks

·         CCTV

·         Password-Protected Configuration and set-up

Software Security

 

 

 

 

 

6. Installation of Anti-virus

7. Installation of Firewall

8. Password Protection

9. Cryptography

10. Audit Trail

Personnel Security

 

 

 

 

 

11. Background check of candidates

12. Selecting and hiring process

13. Mentoring and Training

14. Users’ Manual

Network Security

 

 

 

 

 

15. Access Restriction

16. Cable and wiring protection

Others: please specify:

_________________________________________

_________________________________________

 

Appendix B: Survey Interview Questions

  • How important is the application and maintenance of your computer system in the overall operation of your company?

  • What are the common computer system threats or issues that are faced by your organization:

  • Physical?

  • Hardware?

  • Software?

  • Networking?

  • Personnel?

  • What are the common strategies, procedures and standards your company is implementing in order to prevent computer security threats?

  • Physical?

  • Hardware?

  • Software?

  • Networking?

  • Personnel?

  •  


    0 comments:

    Post a Comment

     
    Top