Survey Questionnaire
Questionnaire
Instruction: Please answer the questions as accurate as you can for your responses will be important for the study – it can affect the accuracy and efficiency of the results and findings of the study. All of the data gathered will be solely used for the academic purposes only.
Background Information
Direction: Tick the box which corresponds to your answer
1. How many computers does your office use?
□ 1 – 15 □ 16 – 30
□ 31 – 55 □ 56 – above
2. Do you have Internet connection?
□ Yes □ No
3. Are you connected through network?
□ Yes □ No
4. What are your common uses of your computer system?
□ internal communication/information sharing
□ connect with the customers/marketing
□ all business transactions and procedures (finance, accounting, etc.)
□ others: please specify: ____________________________________________________________________________________________________________________________________________________________
Computer Security Risks
Direction: Based on your experience as an IT professional, kindly rate the importance and riskiness of different security issues.
5 – very important
4 – important
3 – uncertain
2 – unimportant
1 – very unimportant
Statement
5
4
3
2
1
Physical Security
1. computer facilities (heating, cooling, dehumidifying, ventilating, lighting and power systems)
□
□
□
□
□
2. Theft
□
□
□
□
□
3. Unauthorized entrance to the computer facilities
□
□
□
□
□
Hardware Security
4. Changing the hardware setup parameters
□
□
□
□
□
5. Theft and substitution of removable devices and other equipment
□
□
□
□
□
Software Security
6. Malicious codes (viruses, malware, etc.)
□
□
□
□
□
7. Unauthorized access
□
□
□
□
□
Personnel Security
8. Duties and responsibilities of the employees and the level or degree of their access to computer system
□
□
□
□
□
9. Employee espionage and sabotage
□
□
□
□
□
10. Errors due to human intervention
□
□
□
□
□
11. Correct usage of the computer resources
Network Security
12. Delivering data towards the correct recipient on time
□
□
□
□
□
13. Eavesdrop
□
□
□
□
□
14. Others: please specify:
_________________________________________
_________________________________________
_________________________________________
□
□
□
□
□
Computer Security Prevention
Direction: Based on your current computer security environment, please rate the importance of the following security prevention policies and activities.
Statement
5
4
3
2
1
Physical Security
1. Accidents and Disaster Prevention
· Adequate emergency lighting
· Fireproof containers for media protection
· Continuity plan
· Water/Fire alert systems
□
□
□
□
□
2. Anti-theft and Anti-Unauthorized Users
· Computer Locks
· Facility Locks
· CCTV
· Password-Protected Configuration and set-up
□
□
□
□
□
Software Security
6. Installation of Anti-virus
□
□
□
□
□
7. Installation of Firewall
□
□
□
□
□
8. Password Protection
□
□
□
□
□
9. Cryptography
□
□
□
□
□
10. Audit Trail
□
□
□
□
□
Personnel Security
11. Background check of candidates
□
□
□
□
□
12. Selecting and hiring process
□
□
□
□
□
13. Mentoring and Training
□
□
□
□
□
14. Users’ Manual
□
□
□
□
□
Network Security
15. Access Restriction
□
□
□
□
□
16. Cable and wiring protection
□
□
□
□
□
Others: please specify:
_________________________________________
_________________________________________
□
□
□
□
□
Appendix B: Survey Interview Questions
How important is the application and maintenance of your computer system in the overall operation of your company?
What are the common computer system threats or issues that are faced by your organization:
Physical?
Hardware?
Software?
Networking?
Personnel?
What are the common strategies, procedures and standards your company is implementing in order to prevent computer security threats?
Physical?
Hardware?
Software?
Networking?
Personnel?
0 comments:
Post a Comment