Milijarda podatkov v podatkovni bazi SiStat

To the Top
You are currently atChoose variable

Number of enterprises that have document(s) on measures, practices or procedures on ICT security in enterprises, by size class, Slovenia, 2019

Choose variables

Statistical Office of the Republic of Slovenia, T: +386 1 241 64 04, E: gp.surs@gov.si
6/10/2022
number
Statistical Office of the Republic of Slovenia
Now you have come to the page, Choose variable. This page give you the oportunity to select which variables and values you want to display in your result of the table. A variable is a property of a statistical unit. The page is divided into several boxes, one for each variable, where you can select values by click to highlight one or more values. It always starts with the statistics variable which is the main value counted in the table.
Mandatory

Selected 0 of total 1

Mandatory
Field for searching for a specific value in the list box. This is examples of values you can search for.0 Number of enterprises , 1 Enterprises have document(s) on measures, practices or procedures on ICT security, e.g. established information security policy , 1.1 Document(s) address management of access rights for the usage of ICT, e.g. computers, networks ,

Selected 0 of total 11

Mandatory

Selected 0 of total 4

Number of selected data cells are:
Maximum number allowed is 1,000,000.

Presentation on screen is limited to 1,000 rows and 50 columns

Number of selected cells exceeds the maximum allowed 1,000,000. To download all data from the table, click the "About table" button at the top of the page and export the entire file in Px format.

Notes

DOCUMENT ON ICT SECURITY

1 Enterprises have document(s) on measures, practices or procedures on ICT security, e.g. established information security policy

Documents on ICT security and confidentiality of data (information security policies) cover employee training in ICT use, ICT security measures, the evaluation of ICT security measures, plans for updating ICT security documents, etc.

1.3 Document(s) address procedures or rules to prevent or respond to security incidents, e.g. pharming, phishing attacks, ransomware, etc.

Phishing attack – an attempt to illegally obtain online information, e.g. web passwords, usernames, credit card information via email that directs the user to fake websites.
Pharming attack – users are redirected without their knowledge to malicious web pages, even if they enter the correct web page address they would like to visit in the browser. These are most often complete copies of the original websites, so users do not notice it and provide their personal information without hesitation.
Ransomware attack – malware encrypts data on the computer or network. This prevents users from using them. They can regains access to them after paying a certain amount (ransom).
Linked content:
- Methodological explanations