1. About Your Organisation
Please answer the questions below so we can classify your organisation.
|
|
Please indicate the size of your organisation. |
| |
|
|
|
Please indicate the nature of your organisation below. |
| |
|
|
|
| Please briefly describe your principal business activity. | | |
|
|
|
2. About You
Please indicate the nature of your job role, so we can classify survey responses.
|
|
Which of the following best describes your role? |
| |
|
|
|
3. Computer Asset Classification and Control
Does your organisation keep records on the hardware and software that it uses? Please tick those items which apply.
|
|
|
|
|
4. Risk Management
Does your organisation conduct formal risk management?
|
|
We conduct formal risk management |
| |
|
|
If you conduct formal information security risk management process please tick those items which apply.
|
|
|
|
|
5. Information Security Policy
Does your organisation have a formal (i.e. written) information security policy?
|
|
We have an information security policy |
| |
|
|
Does your organisation have a nominated individual (or individuals) with responsibility for information security?
|
|
Nominated individual(s) with responsibility for information security |
| |
|
|
If you have an information security policy who was involved in its development? Please tick all that apply.
|
|
Who helped to develop your information security policy? |
| |
|
|
|
Skip this part of the question if your organisation already has an information security policy.
Will your organisation get an information security policy?
|
|
|
|
|
6. Personnel Security
Please indicate how strongly you agree or disagree with the following statements.
|
|
|
|
|
7. Physical and Environmental Security
Please indicate how well or badly your organisation tackles the following aspects of physical security.
|
|
|
|
Which of the following physical or environmental security controls does your organisation a) Have in Place or b) Aspire To? Please tick all that apply.
|
|
|
|
|
8. Secure Computer Management
Which of the following secure computer management procedures does your organisation have in place? Please tick all that apply.
|
|
Documented Operating Procedures
Do you have documented operating procedures that address: |
| |
|
|
|
|
9. Secure Systems Development
Does your organisation develop software systems or write programs?
|
|
We develop systems or write programs |
| |
|
|
Skip this part of the question if your organisation does not develop software systems or write programs.
If your organisation develops systems or writes programs which of the following development procedures are used? Please tick all that apply.
|
|
Requirements Capture
When capturing requirements for systems: |
| |
|
|
|
|
10. Access Control
Which of the following access control procedures have been adopted by your organisation use? Please tick all that apply.
|
|
Business Rules
In your organisation: |
| |
|
|
|
|
11. Encryption and Authentication Technologies
Which of the following authentication or encryption technologies are used by your organisation?
|
|
|
|
|
|
|
13. Survey Completed
This completes the survey. Thank-you for your time and responses.
A sample of survey respondents will be invited to participate in more detailed research.
Would you be interested in participating?
|
|
I would be interested in participating further in this research |
| |
|
|
|