This free survey is powered by QUESTIONPRO.COM

NC CYBER

North Carolina Cyber Crime Impact Survey – 2010
Charlotte Division FBI
0%
Exit Survey »
 
 
North Carolina Cyber Crime Impact Survey
Charlotte Division
Federal Bureau of Investigation
2006
Survey Scope
This survey is designed to collect data on the type and frequency of computer security incidents in which a computer was used as the means of committing a crime. This survey is particularly interested in organizations that are identified as part of the Critical Infrastructure and Key Assets, which may have suffered attacks that harmed the confidentiality, integrity, or availability of their network data or systems.
Notice of Confidentiality
Your report to the FBI is confidential. Only persons sworn to uphold the confidentiality of FBI information will see it. Your report will be used only for statistical purposes from which no firm may be identified. Any data published will be sanitized and trended to ensure anonymity.
This Survey’s areas of interest:
Who are you?
What happened?
Details of incident(s)
Vulnerabilities
Threats
Challenges
Reporting
How ready are you for tomorrow?
Who are you?
In this section, we are asking what you and/or your organization do(es), how you see your organization fitting into the National Critical Infrastructure (if it does), how many employees that you have and a guesstimate as to what your organization’s annual expenditure is on computer security.
Comments:
Comments:
Comments:
What happened?
In this section we are seeking information regarding the number of attacks that you experienced, what you suspect the motives for these attacks were and from where you suspect these attacks originated.
 
 
 
6.Did you experience Cyber attacks in the last year?
 
From outside your environment? 1-5 [ ] 6-10 [ ] 10-24 [ ] 25+ [ ] Don’t know
 
From inside your environment? 1-5 [ ] 6-10 [ ] 10-24 [ ] 25+ [ ] Don’t know
 
What Attacks?
 
By Cyber attack we mean any real or suspected adverse event in relation to the security of computer systems or computer networks. Examples of such events are: intrusion of computer systems via the network (often referred to as “hacking”), and focused probes for vulnerabilities via the network to a range of computer systems (often referred to as “scans”).
 
 
 
8.From where do the attacks appear to be originating?
Inside the US? – If so, where do you suspect the source is located?
 
 
 
10.Choose the 3 most costly attacks and how long it took for you to recover.
Day
 
 
 
13.Choose the 3 most costly nefarious activities and how long it took for you to recover.
Day
 
 
 
29.Which types of remote access do you allow to your network?
now
 
 
 
31.Does your organization have a process to monitor or verify the sensitivity of published information on your website(s) or elsewhere, such as trade journals, etc?
Yes
 
PAGE 2
Survey Software Powered by QuestionPro Survey Software