SlideShare a Scribd company logo
QUESTIONNAIRE; ICT SECURITY 
AWARENESS AMONG TEACHERS 
Part A ; Profile Information 
1. Gender 
A. Male 
B. Female 
2. Year of service in current job. 
A. 1 year 
B. Below 5 years 
C. More than 5 years 
3. Age; 
A. Below 30 
B. 31 years – 40 years 
C. 41 years and above 
Part B; ICT Security Awareness Among 
Teachers 
1. Are you aware whether your institution has 
a formal, documented security policy? 
If "No", please skip question number 5 - 7 
and continue at 8. Thank you. 
A. Yes 
B. No 
C. I don’t know 
2. Have you read and understood the security 
policy? 
A. Yes 
B. No 
3. Has your institution documented in any way 
that you have read and understood the 
security policy? (e.g; a signed document) 
A. Yes 
B. No 
C. I don’t know 
4. Does your institution’s policy make it clear 
that you may be held accountable for your 
actions, in case your actions (or inactions) 
violate your institution’s IT security 
policies? 
A. Yes 
B. No 
C. I don’t know 
5. Do the systems you use in your institution 
have automatic logoff and/or automatic lock 
capabilities to terminate a session or lock the 
application or device after a predetermined 
time of inactivity (e.g. screensaver lock)? 
A. Yes, always 
B. No, never 
C. I don’t know 
6. Does your institution require you to use a 
password(s) to access all your user/system 
accounts? 
A. Yes 
B. Hard to say, maybe 
C. No 
7. How is a password change requested? 
A. Often, 1-2 times per month 
B. The system automatically request users 
to change their passwords once every 
predetermined period of time 
C. The system enforce users to use strong 
password 
8. Regarding Antivirus / Antispyware 
protection, are the systems that you use 
(either personal, of your institutions) 
protected by an antivirus / anti-spyware 
software package(s) protecting each desktop 
and laptop 
A. Yes 
B. No 
C. I do not know 
9. Are the systems you use protected from 
virus infections that arrive via Instant 
Messaging clients? (ex.: MSN/Windows 
Live Messenger, Yahoo! Messenger, Google 
Talk etc)? 
A. Yes 
B. No 
C. I do not know 
10. Are the systems you use in your institution 
protected by a firewall? Do you use a 
personal firewall for your personal system(s) 
as well? 
A. Yes, the system I use is protected by a 
firewall and I am using a personal
firewall for my personal system(s) as 
well. 
B. Yes, the system I use is protected by a 
firewall, but I am not using a personal 
firewall for my persona system(s) 
C. No, The system I use is protected by a 
firewall and I am not using a personal 
firewall for my personal system(s) 
D. I do not know. 
11. If the systems you use in your institution 
provide you this option, do you understand 
when to block and when not to block alerts 
of applications trying to access sensitive 
resources (e.g.: alerts from Microsoft 
Windows or similar software firewall)? 
A. Yes, I understand when to block and 
when not to block alerts, also I 
understand how to do this in your 
personal system. 
B. Yes, I understand when to block and 
when not to block. 
C. I do not care. 
12. When a member of your personnel leaves 
the company (or when work/task contract of 
an outside entity ends), does your school 
ensure that; 
A. This person / entity no longer has any 
access your school’s system. 
B. This person / entity does not take any 
sensitive data / information with 
him/her, in order to be used in foul play 
C. My school did not formalize a policy for 
such cases 
D. I do not know 
13. Has your institution implemented 
procedures to control and validate a person’s 
access to facilities based on their role or 
function, including visitor control and 
control of access to software programs for 
testing and revision? 
A. Yes 
B. No 
C. I do not know 
14. Are you aware whether unnecessary services 
are running on your school’s systems? 
A. Yes 
B. No 
C. I do not care 
15. What services does your school you expose 
to the internet? 
A. Web 
B. Database 
C. FTP 
D. SSH 
E. Other 
16. Does your institution perform backups of 
computer systems and data? 
A. Yes, often (everyday) 
B. Yes, but not so often (once per month) 
C. I do not care 
D. I do not know 
E. Other 
17. On what medium do you think the backup 
should be stored for maximum security? 
A. Tape backups 
B. CDs 
C. External hard drives 
D. Networked backed up system 
18. What do you think is the biggest risk for IT 
security? 
A. Users 
B. Computers 
C. Network 
D. Unknown

More Related Content

What's hot

Soal selidik
Soal selidikSoal selidik
Soal selidik
Baju Bundle
 
Pendekatan bertema
Pendekatan bertemaPendekatan bertema
Pendekatan bertema
Humyra Amer
 
Implikasi kepelbagaian sosiobudaya kepada murid
Implikasi kepelbagaian sosiobudaya kepada muridImplikasi kepelbagaian sosiobudaya kepada murid
Implikasi kepelbagaian sosiobudaya kepada muridIzzat Najmi
 
Ict dalam pendidikan
Ict dalam pendidikanIct dalam pendidikan
Ict dalam pendidikanummuha
 
Perbezaan dan persamaan prinsip pembelajaran gagne dan ewell group tikah
Perbezaan dan persamaan prinsip pembelajaran gagne dan ewell group tikahPerbezaan dan persamaan prinsip pembelajaran gagne dan ewell group tikah
Perbezaan dan persamaan prinsip pembelajaran gagne dan ewell group tikahAtikah Amran
 
Penggunaan ICT Dalam PDP Matematik
Penggunaan ICT Dalam PDP MatematikPenggunaan ICT Dalam PDP Matematik
Penggunaan ICT Dalam PDP Matematik
ikhwankmk92
 
Cabaran dan impak ict terhadap bangsa
Cabaran dan impak ict terhadap bangsaCabaran dan impak ict terhadap bangsa
Cabaran dan impak ict terhadap bangsaShah Final
 
Isu Penggunaan Teknologi dalam PdP Matematik
Isu Penggunaan Teknologi dalam PdP MatematikIsu Penggunaan Teknologi dalam PdP Matematik
Isu Penggunaan Teknologi dalam PdP Matematik
Irma Gurlz
 
Kajian Kes : Kajian Pendidikan Orang Asli Di Malaysia
Kajian Kes : Kajian Pendidikan Orang Asli Di MalaysiaKajian Kes : Kajian Pendidikan Orang Asli Di Malaysia
Kajian Kes : Kajian Pendidikan Orang Asli Di Malaysia
Azuan Hafifi
 
Pendidikan Abad ke-21 (Versi SMIAAG)
Pendidikan Abad ke-21 (Versi SMIAAG)Pendidikan Abad ke-21 (Versi SMIAAG)
Pendidikan Abad ke-21 (Versi SMIAAG)
Muhd Aizuddin Ali
 
20140414111308 topik 8 alat penyelesaian masalah
20140414111308 topik 8 alat penyelesaian masalah20140414111308 topik 8 alat penyelesaian masalah
20140414111308 topik 8 alat penyelesaian masalah
Semut Hitam
 
soalan soal selidik
soalan soal selidiksoalan soal selidik
soalan soal selidik
Agnes Tan
 
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesisLampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
Teacher Nasrah
 
Pertolongan cemas 2
Pertolongan cemas 2Pertolongan cemas 2
Pertolongan cemas 2falissa625
 
PENGAJARAN DAN PEMBELAJARAN BERBANTUKAN KOMPUTER (PPBk)
PENGAJARAN DAN PEMBELAJARAN BERBANTUKAN KOMPUTER (PPBk)PENGAJARAN DAN PEMBELAJARAN BERBANTUKAN KOMPUTER (PPBk)
PENGAJARAN DAN PEMBELAJARAN BERBANTUKAN KOMPUTER (PPBk)
Letchumi Perumal
 
Pembelajaran Tradisional VS Pembelajaran Atas Talian
Pembelajaran Tradisional VS Pembelajaran Atas TalianPembelajaran Tradisional VS Pembelajaran Atas Talian
Pembelajaran Tradisional VS Pembelajaran Atas Talian
Wan Mohamad Farhan
 
PERANAN ICT
PERANAN ICTPERANAN ICT
PERANAN ICT
Jenry Saiparudin
 
Tajuk 4 done
Tajuk 4 doneTajuk 4 done
Tajuk 4 done
Hendon Ramlan
 
SOAL SELIDIK KESEDARAN ICT
SOAL SELIDIK KESEDARAN ICTSOAL SELIDIK KESEDARAN ICT
SOAL SELIDIK KESEDARAN ICT
Huda Wahab
 

What's hot (20)

Soal selidik
Soal selidikSoal selidik
Soal selidik
 
Pendekatan bertema
Pendekatan bertemaPendekatan bertema
Pendekatan bertema
 
Implikasi kepelbagaian sosiobudaya kepada murid
Implikasi kepelbagaian sosiobudaya kepada muridImplikasi kepelbagaian sosiobudaya kepada murid
Implikasi kepelbagaian sosiobudaya kepada murid
 
Ict dalam pendidikan
Ict dalam pendidikanIct dalam pendidikan
Ict dalam pendidikan
 
Perbezaan dan persamaan prinsip pembelajaran gagne dan ewell group tikah
Perbezaan dan persamaan prinsip pembelajaran gagne dan ewell group tikahPerbezaan dan persamaan prinsip pembelajaran gagne dan ewell group tikah
Perbezaan dan persamaan prinsip pembelajaran gagne dan ewell group tikah
 
Penggunaan ICT Dalam PDP Matematik
Penggunaan ICT Dalam PDP MatematikPenggunaan ICT Dalam PDP Matematik
Penggunaan ICT Dalam PDP Matematik
 
Cabaran dan impak ict terhadap bangsa
Cabaran dan impak ict terhadap bangsaCabaran dan impak ict terhadap bangsa
Cabaran dan impak ict terhadap bangsa
 
Isu Penggunaan Teknologi dalam PdP Matematik
Isu Penggunaan Teknologi dalam PdP MatematikIsu Penggunaan Teknologi dalam PdP Matematik
Isu Penggunaan Teknologi dalam PdP Matematik
 
Kajian Kes : Kajian Pendidikan Orang Asli Di Malaysia
Kajian Kes : Kajian Pendidikan Orang Asli Di MalaysiaKajian Kes : Kajian Pendidikan Orang Asli Di Malaysia
Kajian Kes : Kajian Pendidikan Orang Asli Di Malaysia
 
Pendidikan Abad ke-21 (Versi SMIAAG)
Pendidikan Abad ke-21 (Versi SMIAAG)Pendidikan Abad ke-21 (Versi SMIAAG)
Pendidikan Abad ke-21 (Versi SMIAAG)
 
Pengawalan
PengawalanPengawalan
Pengawalan
 
20140414111308 topik 8 alat penyelesaian masalah
20140414111308 topik 8 alat penyelesaian masalah20140414111308 topik 8 alat penyelesaian masalah
20140414111308 topik 8 alat penyelesaian masalah
 
soalan soal selidik
soalan soal selidiksoalan soal selidik
soalan soal selidik
 
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesisLampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
Lampiran a dan b(borang maklumat pelajar dan soal selidik) thesis
 
Pertolongan cemas 2
Pertolongan cemas 2Pertolongan cemas 2
Pertolongan cemas 2
 
PENGAJARAN DAN PEMBELAJARAN BERBANTUKAN KOMPUTER (PPBk)
PENGAJARAN DAN PEMBELAJARAN BERBANTUKAN KOMPUTER (PPBk)PENGAJARAN DAN PEMBELAJARAN BERBANTUKAN KOMPUTER (PPBk)
PENGAJARAN DAN PEMBELAJARAN BERBANTUKAN KOMPUTER (PPBk)
 
Pembelajaran Tradisional VS Pembelajaran Atas Talian
Pembelajaran Tradisional VS Pembelajaran Atas TalianPembelajaran Tradisional VS Pembelajaran Atas Talian
Pembelajaran Tradisional VS Pembelajaran Atas Talian
 
PERANAN ICT
PERANAN ICTPERANAN ICT
PERANAN ICT
 
Tajuk 4 done
Tajuk 4 doneTajuk 4 done
Tajuk 4 done
 
SOAL SELIDIK KESEDARAN ICT
SOAL SELIDIK KESEDARAN ICTSOAL SELIDIK KESEDARAN ICT
SOAL SELIDIK KESEDARAN ICT
 

Viewers also liked

Questionnaire for ICT
Questionnaire for ICTQuestionnaire for ICT
Questionnaire for ICT
skullverine
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
Rosnani Ghazali
 
E hatid lgu ict survey
E hatid lgu ict surveyE hatid lgu ict survey
E hatid lgu ict survey
Riyuzaki Umalla
 
Communication and ICT Progress report
Communication and ICT Progress reportCommunication and ICT Progress report
Communication and ICT Progress report
IITA Youth Agripreneurs
 
Occupational engagement
Occupational engagementOccupational engagement
Occupational engagement
marywicks
 
BC Security Camp 2009
BC Security Camp 2009BC Security Camp 2009
BC Security Camp 2009
myeaton
 
Cybercrime Awareness Campaign
Cybercrime Awareness CampaignCybercrime Awareness Campaign
Cybercrime Awareness Campaign
Jessica Anandajoo
 
Ict Mark Report Dec 09 V2
Ict Mark Report Dec 09 V2Ict Mark Report Dec 09 V2
Ict Mark Report Dec 09 V2
guest594ea
 
Set1 ict-question
Set1 ict-questionSet1 ict-question
Set1 ict-question
Azmiah Mahmud
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
Cg Sue
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidikNoor Abidin
 

Viewers also liked (11)

Questionnaire for ICT
Questionnaire for ICTQuestionnaire for ICT
Questionnaire for ICT
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
E hatid lgu ict survey
E hatid lgu ict surveyE hatid lgu ict survey
E hatid lgu ict survey
 
Communication and ICT Progress report
Communication and ICT Progress reportCommunication and ICT Progress report
Communication and ICT Progress report
 
Occupational engagement
Occupational engagementOccupational engagement
Occupational engagement
 
BC Security Camp 2009
BC Security Camp 2009BC Security Camp 2009
BC Security Camp 2009
 
Cybercrime Awareness Campaign
Cybercrime Awareness CampaignCybercrime Awareness Campaign
Cybercrime Awareness Campaign
 
Ict Mark Report Dec 09 V2
Ict Mark Report Dec 09 V2Ict Mark Report Dec 09 V2
Ict Mark Report Dec 09 V2
 
Set1 ict-question
Set1 ict-questionSet1 ict-question
Set1 ict-question
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 
Borang soal selidik
Borang soal selidikBorang soal selidik
Borang soal selidik
 

Similar to ICT security questionaire

Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_key
thinkict
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
JohnRicos
 
Computer Security
Computer SecurityComputer Security
Computer Security
Cristian Mihai
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
infosec train
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
mattjtoni51554
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
Walmart Super Center
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
Walmart Super Center
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
Walmart Super Center
 
Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
Priyanka Aash
 
E-safety Impero slides Mar2015
E-safety Impero slides Mar2015E-safety Impero slides Mar2015
E-safety Impero slides Mar2015
James Grew
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
Danny Doobay
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
EricK Gasana
 
Information security foundation based on iso iec 27002
Information security foundation based on iso   iec 27002Information security foundation based on iso   iec 27002
Information security foundation based on iso iec 27002
Ajay Kumar Gupta
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Atlantic Training, LLC.
 
SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016
Gene Ferro
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
Jan Wong
 
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docxStuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
picklesvalery
 
Information security management
Information security managementInformation security management
Information security management
UMaine
 
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранГірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Sigma Software
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software Security
Vlad Styran
 

Similar to ICT security questionaire (20)

Computer security and_privacy_tif_key
Computer security and_privacy_tif_keyComputer security and_privacy_tif_key
Computer security and_privacy_tif_key
 
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdfSECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
SECO 406100422-ISF-Sample-Exam-en-v1-0.pdf
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Vulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdfVulnerability Analyst interview Questions.pdf
Vulnerability Analyst interview Questions.pdf
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
 
Introduction To Pc Security
Introduction To Pc SecurityIntroduction To Pc Security
Introduction To Pc Security
 
Third party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaireThird party datasecurity assurance questionnaire
Third party datasecurity assurance questionnaire
 
E-safety Impero slides Mar2015
E-safety Impero slides Mar2015E-safety Impero slides Mar2015
E-safety Impero slides Mar2015
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Information security foundation based on iso iec 27002
Information security foundation based on iso   iec 27002Information security foundation based on iso   iec 27002
Information security foundation based on iso iec 27002
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016SANS OUCH Newsletter April 2016
SANS OUCH Newsletter April 2016
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docxStuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
Stuxnet and U.S Incidence ResponseStudent NameProfessor Na.docx
 
Information security management
Information security managementInformation security management
Information security management
 
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир СтиранГірка правда про безпеку програмного забезпечення, Володимир Стиран
Гірка правда про безпеку програмного забезпечення, Володимир Стиран
 
Sigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software SecuritySigma Open Tech Week: Bitter Truth About Software Security
Sigma Open Tech Week: Bitter Truth About Software Security
 

Recently uploaded

CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
Iris Thiele Isip-Tan
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
Steve Thomason
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
OH TEIK BIN
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
Kalna College
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
David Douglas School District
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
nitinpv4ai
 

Recently uploaded (20)

CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
Educational Technology in the Health Sciences
Educational Technology in the Health SciencesEducational Technology in the Health Sciences
Educational Technology in the Health Sciences
 
A Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two HeartsA Visual Guide to 1 Samuel | A Tale of Two Hearts
A Visual Guide to 1 Samuel | A Tale of Two Hearts
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxA Free 200-Page eBook ~ Brain and Mind Exercise.pptx
A Free 200-Page eBook ~ Brain and Mind Exercise.pptx
 
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
220711130083 SUBHASHREE RAKSHIT  Internet resources for social science220711130083 SUBHASHREE RAKSHIT  Internet resources for social science
220711130083 SUBHASHREE RAKSHIT Internet resources for social science
 
Juneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School DistrictJuneteenth Freedom Day 2024 David Douglas School District
Juneteenth Freedom Day 2024 David Douglas School District
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Skimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S EliotSkimbleshanks-The-Railway-Cat by T S Eliot
Skimbleshanks-The-Railway-Cat by T S Eliot
 

ICT security questionaire

  • 1. QUESTIONNAIRE; ICT SECURITY AWARENESS AMONG TEACHERS Part A ; Profile Information 1. Gender A. Male B. Female 2. Year of service in current job. A. 1 year B. Below 5 years C. More than 5 years 3. Age; A. Below 30 B. 31 years – 40 years C. 41 years and above Part B; ICT Security Awareness Among Teachers 1. Are you aware whether your institution has a formal, documented security policy? If "No", please skip question number 5 - 7 and continue at 8. Thank you. A. Yes B. No C. I don’t know 2. Have you read and understood the security policy? A. Yes B. No 3. Has your institution documented in any way that you have read and understood the security policy? (e.g; a signed document) A. Yes B. No C. I don’t know 4. Does your institution’s policy make it clear that you may be held accountable for your actions, in case your actions (or inactions) violate your institution’s IT security policies? A. Yes B. No C. I don’t know 5. Do the systems you use in your institution have automatic logoff and/or automatic lock capabilities to terminate a session or lock the application or device after a predetermined time of inactivity (e.g. screensaver lock)? A. Yes, always B. No, never C. I don’t know 6. Does your institution require you to use a password(s) to access all your user/system accounts? A. Yes B. Hard to say, maybe C. No 7. How is a password change requested? A. Often, 1-2 times per month B. The system automatically request users to change their passwords once every predetermined period of time C. The system enforce users to use strong password 8. Regarding Antivirus / Antispyware protection, are the systems that you use (either personal, of your institutions) protected by an antivirus / anti-spyware software package(s) protecting each desktop and laptop A. Yes B. No C. I do not know 9. Are the systems you use protected from virus infections that arrive via Instant Messaging clients? (ex.: MSN/Windows Live Messenger, Yahoo! Messenger, Google Talk etc)? A. Yes B. No C. I do not know 10. Are the systems you use in your institution protected by a firewall? Do you use a personal firewall for your personal system(s) as well? A. Yes, the system I use is protected by a firewall and I am using a personal
  • 2. firewall for my personal system(s) as well. B. Yes, the system I use is protected by a firewall, but I am not using a personal firewall for my persona system(s) C. No, The system I use is protected by a firewall and I am not using a personal firewall for my personal system(s) D. I do not know. 11. If the systems you use in your institution provide you this option, do you understand when to block and when not to block alerts of applications trying to access sensitive resources (e.g.: alerts from Microsoft Windows or similar software firewall)? A. Yes, I understand when to block and when not to block alerts, also I understand how to do this in your personal system. B. Yes, I understand when to block and when not to block. C. I do not care. 12. When a member of your personnel leaves the company (or when work/task contract of an outside entity ends), does your school ensure that; A. This person / entity no longer has any access your school’s system. B. This person / entity does not take any sensitive data / information with him/her, in order to be used in foul play C. My school did not formalize a policy for such cases D. I do not know 13. Has your institution implemented procedures to control and validate a person’s access to facilities based on their role or function, including visitor control and control of access to software programs for testing and revision? A. Yes B. No C. I do not know 14. Are you aware whether unnecessary services are running on your school’s systems? A. Yes B. No C. I do not care 15. What services does your school you expose to the internet? A. Web B. Database C. FTP D. SSH E. Other 16. Does your institution perform backups of computer systems and data? A. Yes, often (everyday) B. Yes, but not so often (once per month) C. I do not care D. I do not know E. Other 17. On what medium do you think the backup should be stored for maximum security? A. Tape backups B. CDs C. External hard drives D. Networked backed up system 18. What do you think is the biggest risk for IT security? A. Users B. Computers C. Network D. Unknown