1. QUESTIONNAIRE; ICT SECURITY
AWARENESS AMONG TEACHERS
Part A ; Profile Information
1. Gender
A. Male
B. Female
2. Year of service in current job.
A. 1 year
B. Below 5 years
C. More than 5 years
3. Age;
A. Below 30
B. 31 years – 40 years
C. 41 years and above
Part B; ICT Security Awareness Among
Teachers
1. Are you aware whether your institution has
a formal, documented security policy?
If "No", please skip question number 5 - 7
and continue at 8. Thank you.
A. Yes
B. No
C. I don’t know
2. Have you read and understood the security
policy?
A. Yes
B. No
3. Has your institution documented in any way
that you have read and understood the
security policy? (e.g; a signed document)
A. Yes
B. No
C. I don’t know
4. Does your institution’s policy make it clear
that you may be held accountable for your
actions, in case your actions (or inactions)
violate your institution’s IT security
policies?
A. Yes
B. No
C. I don’t know
5. Do the systems you use in your institution
have automatic logoff and/or automatic lock
capabilities to terminate a session or lock the
application or device after a predetermined
time of inactivity (e.g. screensaver lock)?
A. Yes, always
B. No, never
C. I don’t know
6. Does your institution require you to use a
password(s) to access all your user/system
accounts?
A. Yes
B. Hard to say, maybe
C. No
7. How is a password change requested?
A. Often, 1-2 times per month
B. The system automatically request users
to change their passwords once every
predetermined period of time
C. The system enforce users to use strong
password
8. Regarding Antivirus / Antispyware
protection, are the systems that you use
(either personal, of your institutions)
protected by an antivirus / anti-spyware
software package(s) protecting each desktop
and laptop
A. Yes
B. No
C. I do not know
9. Are the systems you use protected from
virus infections that arrive via Instant
Messaging clients? (ex.: MSN/Windows
Live Messenger, Yahoo! Messenger, Google
Talk etc)?
A. Yes
B. No
C. I do not know
10. Are the systems you use in your institution
protected by a firewall? Do you use a
personal firewall for your personal system(s)
as well?
A. Yes, the system I use is protected by a
firewall and I am using a personal
2. firewall for my personal system(s) as
well.
B. Yes, the system I use is protected by a
firewall, but I am not using a personal
firewall for my persona system(s)
C. No, The system I use is protected by a
firewall and I am not using a personal
firewall for my personal system(s)
D. I do not know.
11. If the systems you use in your institution
provide you this option, do you understand
when to block and when not to block alerts
of applications trying to access sensitive
resources (e.g.: alerts from Microsoft
Windows or similar software firewall)?
A. Yes, I understand when to block and
when not to block alerts, also I
understand how to do this in your
personal system.
B. Yes, I understand when to block and
when not to block.
C. I do not care.
12. When a member of your personnel leaves
the company (or when work/task contract of
an outside entity ends), does your school
ensure that;
A. This person / entity no longer has any
access your school’s system.
B. This person / entity does not take any
sensitive data / information with
him/her, in order to be used in foul play
C. My school did not formalize a policy for
such cases
D. I do not know
13. Has your institution implemented
procedures to control and validate a person’s
access to facilities based on their role or
function, including visitor control and
control of access to software programs for
testing and revision?
A. Yes
B. No
C. I do not know
14. Are you aware whether unnecessary services
are running on your school’s systems?
A. Yes
B. No
C. I do not care
15. What services does your school you expose
to the internet?
A. Web
B. Database
C. FTP
D. SSH
E. Other
16. Does your institution perform backups of
computer systems and data?
A. Yes, often (everyday)
B. Yes, but not so often (once per month)
C. I do not care
D. I do not know
E. Other
17. On what medium do you think the backup
should be stored for maximum security?
A. Tape backups
B. CDs
C. External hard drives
D. Networked backed up system
18. What do you think is the biggest risk for IT
security?
A. Users
B. Computers
C. Network
D. Unknown