SlideShare a Scribd company logo
1 of 2
QUESTIONNAIRE; ICT SECURITY 
AWARENESS AMONG TEACHERS 
Part A ; Profile Information 
1. Gender 
A. Male 
B. Female 
2. Year of service in current job. 
A. 1 year 
B. Below 5 years 
C. More than 5 years 
3. Age; 
A. Below 30 
B. 31 years – 40 years 
C. 41 years and above 
Part B; ICT Security Awareness Among 
Teachers 
1. Are you aware whether your institution has 
a formal, documented security policy? 
If "No", please skip question number 5 - 7 
and continue at 8. Thank you. 
A. Yes 
B. No 
C. I don’t know 
2. Have you read and understood the security 
policy? 
A. Yes 
B. No 
3. Has your institution documented in any way 
that you have read and understood the 
security policy? (e.g; a signed document) 
A. Yes 
B. No 
C. I don’t know 
4. Does your institution’s policy make it clear 
that you may be held accountable for your 
actions, in case your actions (or inactions) 
violate your institution’s IT security 
policies? 
A. Yes 
B. No 
C. I don’t know 
5. Do the systems you use in your institution 
have automatic logoff and/or automatic lock 
capabilities to terminate a session or lock the 
application or device after a predetermined 
time of inactivity (e.g. screensaver lock)? 
A. Yes, always 
B. No, never 
C. I don’t know 
6. Does your institution require you to use a 
password(s) to access all your user/system 
accounts? 
A. Yes 
B. Hard to say, maybe 
C. No 
7. How is a password change requested? 
A. Often, 1-2 times per month 
B. The system automatically request users 
to change their passwords once every 
predetermined period of time 
C. The system enforce users to use strong 
password 
8. Regarding Antivirus / Antispyware 
protection, are the systems that you use 
(either personal, of your institutions) 
protected by an antivirus / anti-spyware 
software package(s) protecting each desktop 
and laptop 
A. Yes 
B. No 
C. I do not know 
9. Are the systems you use protected from 
virus infections that arrive via Instant 
Messaging clients? (ex.: MSN/Windows 
Live Messenger, Yahoo! Messenger, Google 
Talk etc)? 
A. Yes 
B. No 
C. I do not know 
10. Are the systems you use in your institution 
protected by a firewall? Do you use a 
personal firewall for your personal system(s) 
as well? 
A. Yes, the system I use is protected by a 
firewall and I am using a personal
firewall for my personal system(s) as 
well. 
B. Yes, the system I use is protected by a 
firewall, but I am not using a personal 
firewall for my persona system(s) 
C. No, The system I use is protected by a 
firewall and I am not using a personal 
firewall for my personal system(s) 
D. I do not know. 
11. If the systems you use in your institution 
provide you this option, do you understand 
when to block and when not to block alerts 
of applications trying to access sensitive 
resources (e.g.: alerts from Microsoft 
Windows or similar software firewall)? 
A. Yes, I understand when to block and 
when not to block alerts, also I 
understand how to do this in your 
personal system. 
B. Yes, I understand when to block and 
when not to block. 
C. I do not care. 
12. When a member of your personnel leaves 
the company (or when work/task contract of 
an outside entity ends), does your school 
ensure that; 
A. This person / entity no longer has any 
access your school’s system. 
B. This person / entity does not take any 
sensitive data / information with 
him/her, in order to be used in foul play 
C. My school did not formalize a policy for 
such cases 
D. I do not know 
13. Has your institution implemented 
procedures to control and validate a person’s 
access to facilities based on their role or 
function, including visitor control and 
control of access to software programs for 
testing and revision? 
A. Yes 
B. No 
C. I do not know 
14. Are you aware whether unnecessary services 
are running on your school’s systems? 
A. Yes 
B. No 
C. I do not care 
15. What services does your school you expose 
to the internet? 
A. Web 
B. Database 
C. FTP 
D. SSH 
E. Other 
16. Does your institution perform backups of 
computer systems and data? 
A. Yes, often (everyday) 
B. Yes, but not so often (once per month) 
C. I do not care 
D. I do not know 
E. Other 
17. On what medium do you think the backup 
should be stored for maximum security? 
A. Tape backups 
B. CDs 
C. External hard drives 
D. Networked backed up system 
18. What do you think is the biggest risk for IT 
security? 
A. Users 
B. Computers 
C. Network 
D. Unknown

More Related Content

What's hot

Bab7 pengembangan perniagaan[1]
Bab7 pengembangan perniagaan[1]Bab7 pengembangan perniagaan[1]
Bab7 pengembangan perniagaan[1]WanBK Leo
 
Borang kaji selidik t3 assistive technology
Borang kaji selidik t3 assistive technologyBorang kaji selidik t3 assistive technology
Borang kaji selidik t3 assistive technologySuziana Kamaruddin
 
Surat Tarik Diri dari Firma (Latihan Industri)
Surat Tarik Diri dari Firma (Latihan Industri)Surat Tarik Diri dari Firma (Latihan Industri)
Surat Tarik Diri dari Firma (Latihan Industri)Rizalshah Zulkifli
 
Bab 1 pengenalan teknologi maklumat
Bab 1 pengenalan teknologi maklumatBab 1 pengenalan teknologi maklumat
Bab 1 pengenalan teknologi maklumatNur Az
 
AKTA KESELAMATAN DAN KESIHATAN PEKERJAAN 1994 - AKTA 514
AKTA KESELAMATAN DAN KESIHATAN PEKERJAAN 1994 - AKTA 514AKTA KESELAMATAN DAN KESIHATAN PEKERJAAN 1994 - AKTA 514
AKTA KESELAMATAN DAN KESIHATAN PEKERJAAN 1994 - AKTA 514Muhammad Nasrullah
 
Era pemerintahan tun hussein onn
Era pemerintahan tun hussein onnEra pemerintahan tun hussein onn
Era pemerintahan tun hussein onnseridatul Md Shah
 
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKMKajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKMNuraini Ismail
 

What's hot (9)

Bab7 pengembangan perniagaan[1]
Bab7 pengembangan perniagaan[1]Bab7 pengembangan perniagaan[1]
Bab7 pengembangan perniagaan[1]
 
Borang kaji selidik t3 assistive technology
Borang kaji selidik t3 assistive technologyBorang kaji selidik t3 assistive technology
Borang kaji selidik t3 assistive technology
 
Surat Tarik Diri dari Firma (Latihan Industri)
Surat Tarik Diri dari Firma (Latihan Industri)Surat Tarik Diri dari Firma (Latihan Industri)
Surat Tarik Diri dari Firma (Latihan Industri)
 
Bab 1 pengenalan teknologi maklumat
Bab 1 pengenalan teknologi maklumatBab 1 pengenalan teknologi maklumat
Bab 1 pengenalan teknologi maklumat
 
EEP
EEP EEP
EEP
 
AKTA KESELAMATAN DAN KESIHATAN PEKERJAAN 1994 - AKTA 514
AKTA KESELAMATAN DAN KESIHATAN PEKERJAAN 1994 - AKTA 514AKTA KESELAMATAN DAN KESIHATAN PEKERJAAN 1994 - AKTA 514
AKTA KESELAMATAN DAN KESIHATAN PEKERJAAN 1994 - AKTA 514
 
Era pemerintahan tun hussein onn
Era pemerintahan tun hussein onnEra pemerintahan tun hussein onn
Era pemerintahan tun hussein onn
 
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKMKajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
Kajian Kumpulan Tahap Keselesaan Bekerja dalam kalangan staff PPUKM
 
Osha94
Osha94Osha94
Osha94
 

Viewers also liked

Questionnaire for ICT
Questionnaire for ICTQuestionnaire for ICT
Questionnaire for ICTskullverine
 
SOAL SELIDIK KESEDARAN ICT
SOAL SELIDIK KESEDARAN ICTSOAL SELIDIK KESEDARAN ICT
SOAL SELIDIK KESEDARAN ICTHuda Wahab
 
Occupational engagement
Occupational engagementOccupational engagement
Occupational engagementmarywicks
 
BC Security Camp 2009
BC Security Camp 2009BC Security Camp 2009
BC Security Camp 2009myeaton
 
Cybercrime Awareness Campaign
Cybercrime Awareness CampaignCybercrime Awareness Campaign
Cybercrime Awareness CampaignJessica Anandajoo
 
Ict Mark Report Dec 09 V2
Ict Mark Report Dec 09 V2Ict Mark Report Dec 09 V2
Ict Mark Report Dec 09 V2guest594ea
 
Laporan soal selidik tahap kesedaran dan pengetahuan ICT guru
Laporan soal selidik tahap kesedaran dan pengetahuan ICT guruLaporan soal selidik tahap kesedaran dan pengetahuan ICT guru
Laporan soal selidik tahap kesedaran dan pengetahuan ICT guruSMK NARINANG
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidikCg Sue
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidikNoor Abidin
 

Viewers also liked (13)

Questionnaire for ICT
Questionnaire for ICTQuestionnaire for ICT
Questionnaire for ICT
 
SOAL SELIDIK KESEDARAN ICT
SOAL SELIDIK KESEDARAN ICTSOAL SELIDIK KESEDARAN ICT
SOAL SELIDIK KESEDARAN ICT
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
E hatid lgu ict survey
E hatid lgu ict surveyE hatid lgu ict survey
E hatid lgu ict survey
 
Communication and ICT Progress report
Communication and ICT Progress reportCommunication and ICT Progress report
Communication and ICT Progress report
 
Occupational engagement
Occupational engagementOccupational engagement
Occupational engagement
 
BC Security Camp 2009
BC Security Camp 2009BC Security Camp 2009
BC Security Camp 2009
 
Cybercrime Awareness Campaign
Cybercrime Awareness CampaignCybercrime Awareness Campaign
Cybercrime Awareness Campaign
 
Ict Mark Report Dec 09 V2
Ict Mark Report Dec 09 V2Ict Mark Report Dec 09 V2
Ict Mark Report Dec 09 V2
 
Set1 ict-question
Set1 ict-questionSet1 ict-question
Set1 ict-question
 
Laporan soal selidik tahap kesedaran dan pengetahuan ICT guru
Laporan soal selidik tahap kesedaran dan pengetahuan ICT guruLaporan soal selidik tahap kesedaran dan pengetahuan ICT guru
Laporan soal selidik tahap kesedaran dan pengetahuan ICT guru
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 

Similar to ICT security questionaire

Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_keythinkict
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfJohnRicos
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfinfosec train
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxmattjtoni51554
 
Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnairePriyanka Aash
 
E-safety Impero slides Mar2015
E-safety Impero slides Mar2015E-safety Impero slides Mar2015
E-safety Impero slides Mar2015James Grew
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
Information security foundation based on iso iec 27002
Information security foundation based on iso   iec 27002Information security foundation based on iso   iec 27002
Information security foundation based on iso iec 27002Ajay Kumar Gupta
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016Gene Ferro
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyJan Wong
 
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docxStuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docxpicklesvalery
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранГірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранSigma Software
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecurityVlad Styran
 

Similar to ICT security questionaire (20)

Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_key
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
 
Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
 
E-safety Impero slides Mar2015
E-safety Impero slides Mar2015E-safety Impero slides Mar2015
E-safety Impero slides Mar2015
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Information security foundation based on iso iec 27002
Information security foundation based on iso   iec 27002Information security foundation based on iso   iec 27002
Information security foundation based on iso iec 27002
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docxStuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
 
Information security management
Information security managementInformation security management
Information security management
 
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранГірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software Security
 

Recently uploaded

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxCeline George
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use CasesTechSoup
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningMarc Dusseiller Dusjagr
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonhttgc7rh9c
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of PlayPooky Knightsmith
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxakanksha16arora
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 

Recently uploaded (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Our Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdfOur Environment Class 10 Science Notes pdf
Our Environment Class 10 Science Notes pdf
 
Introduction to TechSoup’s Digital Marketing Services and Use Cases
Introduction to TechSoup’s Digital Marketing  Services and Use CasesIntroduction to TechSoup’s Digital Marketing  Services and Use Cases
Introduction to TechSoup’s Digital Marketing Services and Use Cases
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lessonQUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
QUATER-1-PE-HEALTH-LC2- this is just a sample of unpacked lesson
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

ICT security questionaire

  • 1. QUESTIONNAIRE; ICT SECURITY AWARENESS AMONG TEACHERS Part A ; Profile Information 1. Gender A. Male B. Female 2. Year of service in current job. A. 1 year B. Below 5 years C. More than 5 years 3. Age; A. Below 30 B. 31 years – 40 years C. 41 years and above Part B; ICT Security Awareness Among Teachers 1. Are you aware whether your institution has a formal, documented security policy? If "No", please skip question number 5 - 7 and continue at 8. Thank you. A. Yes B. No C. I don’t know 2. Have you read and understood the security policy? A. Yes B. No 3. Has your institution documented in any way that you have read and understood the security policy? (e.g; a signed document) A. Yes B. No C. I don’t know 4. Does your institution’s policy make it clear that you may be held accountable for your actions, in case your actions (or inactions) violate your institution’s IT security policies? A. Yes B. No C. I don’t know 5. Do the systems you use in your institution have automatic logoff and/or automatic lock capabilities to terminate a session or lock the application or device after a predetermined time of inactivity (e.g. screensaver lock)? A. Yes, always B. No, never C. I don’t know 6. Does your institution require you to use a password(s) to access all your user/system accounts? A. Yes B. Hard to say, maybe C. No 7. How is a password change requested? A. Often, 1-2 times per month B. The system automatically request users to change their passwords once every predetermined period of time C. The system enforce users to use strong password 8. Regarding Antivirus / Antispyware protection, are the systems that you use (either personal, of your institutions) protected by an antivirus / anti-spyware software package(s) protecting each desktop and laptop A. Yes B. No C. I do not know 9. Are the systems you use protected from virus infections that arrive via Instant Messaging clients? (ex.: MSN/Windows Live Messenger, Yahoo! Messenger, Google Talk etc)? A. Yes B. No C. I do not know 10. Are the systems you use in your institution protected by a firewall? Do you use a personal firewall for your personal system(s) as well? A. Yes, the system I use is protected by a firewall and I am using a personal
  • 2. firewall for my personal system(s) as well. B. Yes, the system I use is protected by a firewall, but I am not using a personal firewall for my persona system(s) C. No, The system I use is protected by a firewall and I am not using a personal firewall for my personal system(s) D. I do not know. 11. If the systems you use in your institution provide you this option, do you understand when to block and when not to block alerts of applications trying to access sensitive resources (e.g.: alerts from Microsoft Windows or similar software firewall)? A. Yes, I understand when to block and when not to block alerts, also I understand how to do this in your personal system. B. Yes, I understand when to block and when not to block. C. I do not care. 12. When a member of your personnel leaves the company (or when work/task contract of an outside entity ends), does your school ensure that; A. This person / entity no longer has any access your school’s system. B. This person / entity does not take any sensitive data / information with him/her, in order to be used in foul play C. My school did not formalize a policy for such cases D. I do not know 13. Has your institution implemented procedures to control and validate a person’s access to facilities based on their role or function, including visitor control and control of access to software programs for testing and revision? A. Yes B. No C. I do not know 14. Are you aware whether unnecessary services are running on your school’s systems? A. Yes B. No C. I do not care 15. What services does your school you expose to the internet? A. Web B. Database C. FTP D. SSH E. Other 16. Does your institution perform backups of computer systems and data? A. Yes, often (everyday) B. Yes, but not so often (once per month) C. I do not care D. I do not know E. Other 17. On what medium do you think the backup should be stored for maximum security? A. Tape backups B. CDs C. External hard drives D. Networked backed up system 18. What do you think is the biggest risk for IT security? A. Users B. Computers C. Network D. Unknown