|
Hello: You are invited to participate in our survey to help us understand the current levels of knowledge at Virgin Atlantic with regard to Information Security. In this survey, approximately 50 people will be asked to complete a survey that asks questions about general security measures and access to information at Virgin Atlantic. It will take approximately 8 minutes to complete the questionnaire and should be fun and easy to do.
Please note that your participation in this study is completely voluntary. Consequently, if you feel uncomfortable answering any questions, you can withdraw from the survey at any point. However, it would be extremely useful for us to learn a little more about your thoughts and opinions.
Survey responses are strictly confidential and data from this research will be reported only in the aggregate. Your information will be coded and will remain confidential. If you have questions at any time about the survey or the procedures, you may contact Lucy Cairns at 01293 448197 or by email at the email address specified below.
Thank you very much for your time and support. Please start with the survey now by clicking on the Continue button below.
|
| |
|
|
|
1. About Your Department
Please answer the questions below so we can classify your Department.
|
|
* Please indicate the size of your Department. |
| |
|
|
|
* Please indicate the nature of the work your Department is involved in. |
| |
|
|
|
| Please give a brief description of your principal business activity. | | |
|
|
|
2. About You
Please indicate the nature of your job role, so we can classify survey responses.
|
|
Which of the following best describes your role? |
| |
|
|
|
3. Computer Asset Classification and Control
Does your organisation keep records on the hardware and software that it uses? Please tick those items which apply.
|
|
|
|
|
4. Risk Management
Does your organisation conduct formal risk management?
|
|
We conduct formal risk management |
| |
|
|
If you conduct formal information security risk management process please tick those items which apply.
|
|
|
|
|
5. Information Security Policy
Does your organisation have a formal (i.e. written) information security policy?
|
|
We have an information security policy |
| |
|
|
Does your organisation have a nominated individual (or individuals) with responsibility for information security?
|
|
Nominated individual(s) with responsibility for information security |
| |
|
|
If you have an information security policy who was involved in its development? Please tick all that apply.
|
|
Who helped to develop your information security policy? |
| |
|
|
|
Skip this part of the question if your organisation already has an information security policy.
Will your organisation get an information security policy?
|
|
|
|
|
6. Personnel Security
Please indicate how strongly you agree or disagree with the following statements.
|
|
|
|
|
7. Physical and Environmental Security
Please indicate how well or badly your organisation tackles the following aspects of physical security.
|
|
|
|
Which of the following physical or environmental security controls does your organisation a) Have in Place or b) Aspire To? Please tick all that apply.
|
|
|
|
|
8. Secure Computer Management
Which of the following secure computer management procedures does your organisation have in place? Please tick all that apply.
|
|
Documented Operating Procedures
Do you have documented operating procedures that address: |
| |
|
|
|
|
9. Secure Systems Development
Does your organisation develop software systems or write programs?
|
|
We develop systems or write programs |
| |
|
|
Skip this part of the question if your organisation does not develop software systems or write programs.
If your organisation develops systems or writes programs which of the following development procedures are used? Please tick all that apply.
|
|
Requirements Capture
When capturing requirements for systems: |
| |
|
|
|
|
10. Access Control
Which of the following access control procedures have been adopted by your organisation use? Please tick all that apply.
|
|
Business Rules
In your organisation: |
| |
|
|
|
|
11. Encryption and Authentication Technologies
Which of the following authentication or encryption technologies are used by your organisation?
|
|
|
|
|
|
|
13. Survey Completed
This completes the survey. Thank-you for your time and responses.
A sample of survey respondents will be invited to participate in more detailed research.
Would you be interested in participating?
|
|
I would be interested in participating further in this research |
| |
|
|
|