SIGN UP FREE
Survey Templates Surveys Information Security Awareness in UK Production &

Information Security Awareness in UK Production &

Information Security Awareness in UK Production & Tooling Sector SMEs



Please indicate the size of your organisation.
Question Explanation
Please indicate the nature of your organisation below.
Please briefly describe your principal business activity.

Which of the following best describes your role?
Question Explanation

3. Computer Asset Classification and Control




Does your organisation keep records on the hardware and software that it uses? Please tick those items which apply.

Question Explanation
Actually Done
An inventory of software is kept

An inventory of hardware is kept

Unlicensed or illegal software tracked and deleted

Access control records (who is allowed access to what) are kept


We conduct formal risk management
Question Explanation


If you conduct formal information security risk management process please tick those items which apply.

Question Explanation
Actually Done
Have vulnerable assets been identified?

Have threats to vulnerable assets been identified?

Are information security risks quantified?


We have an information security policy
Question Explanation

Who helped to develop your information security policy?
Question Explanation
Will your organisation get an information security policy?


Question Explanation
Yes
No
Do Not Know
Do you intend to develop an information security policy?
Do you intend to purchase an information security policy?
Are you aware of ISO/IEC 17799?

Nominated individual(s) with responsibility for information security
Question Explanation

6. Personnel Security






Please indicate how strongly you agree or disagree with the following statements.


Question Explanation
Strongly Agree
Slightly Agree
Slightly Disagree
Strongly Disagree
Written job descriptions must include responsibility for information security

It is necessary for the organisation to conduct background checks on staff

Staff must sign a confidentiality agreement

It is essential to provide staff training on information security policies and procedures

There must be formal procedures for reporting information security incidents

There must be a formal disciplinary process for staff who violate information security policies and procedures

Employees must be involved in the formulation of information security policies in order to encourage a sense of ownership

7. Physical and Environmental Security






Please indicate how well or badly your organisation tackles the following aspects of physical security.

Question Explanation
Very Well
Satisfactorily
Very Badly
Is your computer equipment physically secured?

Is physical access to computer equipment controlled?

Are visitors and contractors supervised?

Does authorisation and checking occur on equipment entering or leaving your site?


Which of the following physical or environmental security controls does your organisation a) Have in Place or b) Aspire To? Please tick all that apply.

Question Explanation
Have in Place
Aspire To
Equipment sited or protected to reduce environmental threats or hazards.

Equipment sited or protected to reduce opportunities for unauthorised access.

Equipment protected from power failures and surges.

Equipment correctly maintained to ensure continued availability and integrity.

Fully compliant with insurance policy requirements.

Security risks are considered for off-site working.

Sensitive data and licensed software removed from data-storage equipment prior to disposal.




Documented Operating Procedures


Do you have documented operating procedures that address:
Question Explanation

We develop systems or write programs
Question Explanation


Requirements Capture


When capturing requirements for systems:
Question Explanation


Business Rules

In your organisation:
Question Explanation

11. Encryption and Authentication Technologies





Which of the following encryption or authentication technologies are used by your organisation?

Question Explanation
Used
Not Used
Do Not Know
Message authentication. This establishes the message says what it is supposed to say and comes from where it purports to come from.

User authentication. This establishes that system users are who they say they are.

Encryption. This protects data by converting it into an unreadable form, except by those who have decryption keys.


I would be interested in participating further in this research
Question Explanation

Related templates and questionnaires