Tabel

dataset_anon


Beskrivelse ?

Exported data from the survey

Størrelse (Antal rækker) ?

360

Indhold (Kolonner/variable) ?

Navn Indhold
s_1_1 What are your responsibilities in your organization? Select one or more - Management related tasks
s_1_2 What are your responsibilities in your organization? Select one or more - IT-security related tasks
s_1_3 What are your responsibilities in your organization? Select one or more - Privacy/data protection related tasks
s_1_4 What are your responsibilities in your organization? Select one or more - Software development related tasks
s_1_5 What are your responsibilities in your organization? Select one or more - IT administrator related tasks
s_1_6 What are your responsibilities in your organization? Select one or more - Other, please specify
s_134 What are your responsibilities in your organization? Select one or more - Other, please specify
s_3 How many employees are there in your organisation?
s_2_1 What industry sector is your organisation in? - Media & Publishing
s_2_2 What industry sector is your organisation in? - Health care
s_2_3 What industry sector is your organisation in? - Financial services
s_2_4 What industry sector is your organisation in? - Software development
s_2_5 What industry sector is your organisation in? - Entertainment & Music
s_2_6 What industry sector is your organisation in? - Education
s_2_7 What industry sector is your organisation in? - Manufacturing
s_2_8 What industry sector is your organisation in? - Consultancy
s_2_9 What industry sector is your organisation in? - Life Sciences and Pharmaceuticals
s_2_10 What industry sector is your organisation in? - Insurance
s_2_11 What industry sector is your organisation in? - Other
s_43_1 In which countries does your organisation have branches? Select one or more - Denmark
s_43_2 In which countries does your organisation have branches? Select one or more - Other Nordic countries
s_43_3 In which countries does your organisation have branches? Select one or more - Other EU countries (non-Nordic)
s_43_4 In which countries does your organisation have branches? Select one or more - Non-EU countries
s_44 What is your organisation’s turnover (in DKK)?
s_105 Do you have a yearly budget allocated for Security & Privacy needs?
s_106 If YES, what percentage of your IT budget does it constitute?
s_136 To what extent your organization has outsourced IT systems and IT security?
s_46_1 How do you measure your cyber-security and privacy readiness? Select one or more - We rely on the IT solutions derived from established security and privacy standards
s_46_2 How do you measure your cyber-security and privacy readiness? Select one or more - Internal method/ framework/ procedure
s_46_3 How do you measure your cyber-security and privacy readiness? Select one or more - We do not have any measures
s_46_4 How do you measure your cyber-security and privacy readiness? Select one or more - Not sure
s_48_1 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - ISO/IEC 27001
s_48_2 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - ISO 27701
s_48_3 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - Center for Internet Security - Critical Security Controls (CIS CSC)
s_48_4 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - Control Objectives for Information and Related Technologies (COBIT)
s_48_5 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - Security for Industrial Automation and Control Systems (ANSI/ISA-62443)
s_48_6 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - NIST Special Publication 800-53 (NIST SP 800-53)
s_48_7 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - Payment Card Industry Data Security Standard (PCI DSS)
s_48_8 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - UK National Cyber Security Centre (NCSC) 10 Steps
s_48_9 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - UK National Health System (NHS) Digital Data Security and Protection Toolkit
s_48_10 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - Cyber Assessment Framework (CAF)
s_48_11 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - Information Assurance Small and Medium Enterprises (IASME)
s_48_12 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - Host-Based Security System (HBSS)
s_48_13 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - Structured Threat Information Expressions (STIX)
s_48_14 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - Assured Compliance Accreditation Solutions (ACAS)
s_48_15 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - Cyber Federated Model (CFM)
s_48_16 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - Other, please specify
s_5 If you rely on established standards to measure your cyber-security and privacy readiness, which ones do you use? Select one or more - Other, please specify
s_47_1 How is your security and privacy practice defined? Select one or more - Practices to be followed defined at the company level
s_47_2 How is your security and privacy practice defined? Select one or more - Practices to be followed defined at the project level
s_47_3 How is your security and privacy practice defined? Select one or more - Practices improved based on previous experience/ projects
s_47_4 How is your security and privacy practice defined? Select one or more - Other, please specify
s_6 How is your security and privacy practice defined? Select one or more - Other, please specify
s_49 Are the methods/ practices/ standards of the company, always followed in all the situations?
s_50_1 If NO, why? Select one or more - They are not always compatible with the functional requirements of our products
s_50_2 If NO, why? Select one or more - I feel that they are not very helpful in protecting security and privacy
s_50_3 If NO, why? Select one or more - They interfere with other workflows in the organisation
s_50_4 If NO, why? Select one or more - They are too complicated to follow exactly as defined
s_50_5 If NO, why? Select one or more - We don't have time or resources to follow them exactly as defined
s_50_6 If NO, why? Select one or more - The management does not think they should be followed exactly as defined
s_50_7 If NO, why? Select one or more - Other, please specify
s_7 If NO, why? Select one or more - Other, please specify
s_52_1 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Network (MAC/IP addresses, domains, and/or packet data)
s_52_2 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Operating system (type and version)
s_52_3 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Execution logs
s_52_4 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Login/logout logs
s_52_5 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Temporary files
s_52_6 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Device (identifiers and related information)
s_52_7 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Closed-circuit recordings
s_52_8 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Key-logs
s_52_9 What kind of information do you gather when investigating a cyber-security incident? Select one or more - E-mails
s_52_10 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Browser history
s_52_11 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Sensor data
s_52_12 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Memory data
s_52_13 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Other, please specify
s_8 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Other, please specify
s_54_1 Which policies are adopted to prevent security and privacy problems working remotely? Select one or more - Doing work only through the organisation's VPN
s_54_2 Which policies are adopted to prevent security and privacy problems working remotely? Select one or more - Having personnel working only on organisation-provided devices
s_54_3 Which policies are adopted to prevent security and privacy problems working remotely? Select one or more - Ensuring that the data from these services is only stored within the organisation IT infrastructure
s_54_4 Which policies are adopted to prevent security and privacy problems working remotely? Select one or more - Making sure there is a data agreement with the providers of the remote work services
s_54_5 Which policies are adopted to prevent security and privacy problems working remotely? Select one or more - Other, please specify
s_9 Which policies are adopted to prevent security and privacy problems working remotely? Select one or more - Other, please specify
s_57 Has anything in the security and privacy practices of your organisation changed since the introduction of the GDPR regarding the following aspects? - Which data is collected by the organisation
s_58 Has anything in the security and privacy practices of your organisation changed since the introduction of the GDPR regarding the following aspects? - How the data subjects are informed about data collection
s_59 Has anything in the security and privacy practices of your organisation changed since the introduction of the GDPR regarding the following aspects? - How the collected data is stored
s_60 Has anything in the security and privacy practices of your organisation changed since the introduction of the GDPR regarding the following aspects? - How the collected data is shared
s_61 Has anything in the security and privacy practices of your organisation changed since the introduction of the GDPR regarding the following aspects? - How the collected data is deleted
s_62 Has anything in the security and privacy practices of your organisation changed since the introduction of the GDPR regarding the following aspects? - Which controls are provided to the data subjects
s_63 Does your organisation collect personal data of people outside the organisation (e.g. users, customers, suppliers etc.)
s_65_1 If your organisation collects personal data, what controls over the collected data are provided to the data subjects? Select one or more - Request an overview of data collected from them
s_65_2 If your organisation collects personal data, what controls over the collected data are provided to the data subjects? Select one or more - Request to delete the data collected from them
s_65_3 If your organisation collects personal data, what controls over the collected data are provided to the data subjects? Select one or more - Request to correct the data collected from them
s_65_4 If your organisation collects personal data, what controls over the collected data are provided to the data subjects? Select one or more - Decide which data they want to share
s_65_5 If your organisation collects personal data, what controls over the collected data are provided to the data subjects? Select one or more - Other, please specify
s_10 If your organisation collects personal data, what controls over the collected data are provided to the data subjects? Select one or more - Other, please specify
s_90_1 Which development method you use (in part or whole) at your company? Select one or more - Classic Waterfall
s_90_2 Which development method you use (in part or whole) at your company? Select one or more - Iterative development
s_90_3 Which development method you use (in part or whole) at your company? Select one or more - V-shaped model
s_90_4 Which development method you use (in part or whole) at your company? Select one or more - Spiral
s_90_5 Which development method you use (in part or whole) at your company? Select one or more - Scaled Agile (SAFe)
s_90_6 Which development method you use (in part or whole) at your company? Select one or more - Large-Scale Scrum
s_90_7 Which development method you use (in part or whole) at your company? Select one or more - Lean Development
s_90_8 Which development method you use (in part or whole) at your company? Select one or more - XP
s_90_9 Which development method you use (in part or whole) at your company? Select one or more - Kanban
s_90_10 Which development method you use (in part or whole) at your company? Select one or more - Devops
s_90_11 Which development method you use (in part or whole) at your company? Select one or more - Other, please specify
s_12 Which development method you use (in part or whole) at your company? Select one or more - Other, please specify
s_91 What is your frequency of software releases? (e.g., Major releases, Minor releases) Select one or more
s_92 When do you integrate security/ privacy into your development practices?
s_13 When do you integrate security/ privacy into your development practices? - Other, please specify
s_94 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Simulation
s_114 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Testing
s_115 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Performance analysis and profiling
s_116 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Core review
s_117 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Formal verification
s_118 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Intrusion detection systems
s_119 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Circuit breakers, load balancers, network isolation
s_121 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Permission management
s_122 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Safe-by-design programming languages (e.g., Rust, Haskell)
s_123 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Blameless post-mortem meetings
s_124 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Peer-review
s_125 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Penetration testing
s_126 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Blu-Red Team exercises
s_127 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Dev(Sec)Ops
s_128 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Site Reliability Engineering
s_129 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Anonymisation of data
s_130 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Pseudonymisaton of data
s_131 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Encryption
s_132 Do you use any of these tools/ procedures to ensure software reliability, security, and privacy? - Timely deletion of data
s_133 Do you use any further tools/ procedures to ensure software reliability, security, and privacy?
s_137 Do you use any further tools/ procedures to ensure software reliability, security, and privacy? - Yes, namely :
s_96 Are the methods/practices /standards for security and privacy protection in the development processes, always followed in all the situations?
s_97_1 If NO, why? - They are not always compatible with the functional requirements of our products
s_97_2 If NO, why? - I don't believe that they are helpful in protecting security and privacy
s_97_3 If NO, why? - They interfere with other workflows of my tasks and responsibilities
s_97_4 If NO, why? - They are too complicated to follow exactly as defined
s_97_5 If NO, why? - We don't have time or resources to follow them exactly as defined
s_97_6 If NO, why? - The management does not think they should be followed exactly as defined
s_97_7 If NO, why? - Other, please specify
s_11_1 Which of these behaviours have you practiced yourself or observed among your colleagues? Select one or more - Sharing passwords with friends/ colleagues
s_11_2 Which of these behaviours have you practiced yourself or observed among your colleagues? Select one or more - Using passwords that are not secure (e.g., less than 12 characters or using family names or dates of birth)
s_11_3 Which of these behaviours have you practiced yourself or observed among your colleagues? Select one or more - Using the same password for multiple systems
s_11_4 Which of these behaviours have you practiced yourself or observed among your colleagues? Select one or more - Using personal online storage systems to exchange and/or keep work-related data
s_11_5 Which of these behaviours have you practiced yourself or observed among your colleagues? Select one or more - Using free-to-access public Wi-Fi to work or with a device containing work-related data
s_11_6 Which of these behaviours have you practiced yourself or observed among your colleagues? Select one or more - Downloading programs from the Internet without the authorisation of the IT department
s_11_7 Which of these behaviours have you practiced yourself or observed among your colleagues? Select one or more - Disabling the anti-virus on work computers to download or run programs from the Internet
s_11_8 Which of these behaviours have you practiced yourself or observed among your colleagues? Select one or more - Accepting friend requests on social media from unknown people
s_11_9 Which of these behaviours have you practiced yourself or observed among your colleagues? Select one or more - Clicking on links contained in unsolicited emails or from an unknown source
s_11_10 Which of these behaviours have you practiced yourself or observed among your colleagues? Select one or more - Sending information (personal, work-related) to strangers over the Internet
s_67_1 What kind of assets of your organisation can be susceptible to a cyber-attack? Select one or more - Customers' and/or suppliers' data
s_67_2 What kind of assets of your organisation can be susceptible to a cyber-attack? Select one or more - Intellectual property
s_67_3 What kind of assets of your organisation can be susceptible to a cyber-attack? Select one or more - IT infrastructure
s_67_4 What kind of assets of your organisation can be susceptible to a cyber-attack? Select one or more - Social media accounts
s_67_5 What kind of assets of your organisation can be susceptible to a cyber-attack? Select one or more - Physical systems (health, transportation, goods)
s_67_6 What kind of assets of your organisation can be susceptible to a cyber-attack? Select one or more - Our website
s_67_7 What kind of assets of your organisation can be susceptible to a cyber-attack? Select one or more - Employees' data
s_67_8 What kind of assets of your organisation can be susceptible to a cyber-attack? Select one or more - Other, please specify
s_11 What kind of assets of your organisation can be susceptible to a cyber-attack? Select one or more - Other, please specify
s_108 How familiar are you with the security and privacy policies your organization wants you to follow?
s_109 If you are familiar with the security and privacy policies, how challenging are they to follow?
s_111 If you are familiar with the security and privacy policies, how helpful do you think are they in protecting against security and privacy risks?
s_73 What is your experience with security and privacy awareness trainings at your company?
s_72 To what extent has pandemic affected your working style, in particular remote working?
s_74 If you started working remotely after the pandemic, how challenging do you find it to comply to the security and privacy policies of your organisation regarding remote work?
s_87 How did your concerns regarding security and privacy in your organizations change because of the pandemic?
s_110 Do you know how to report a security and privacy incident (such as a cyber attack or a data leak) in your organisation?
s_13_1 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Network (MAC/IP addresses, domains, and/or packet data)
s_13_2 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Operating system (type and version)
s_13_3 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Execution logs
s_13_4 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Login/logout logs
s_13_5 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Temporary files
s_13_6 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Device (identifiers and related information)
s_13_7 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Closed-circuit recordings
s_13_8 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Key-logs
s_13_9 What kind of information do you gather when investigating a cyber-security incident? Select one or more - E-mails
s_13_10 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Browser history
s_13_11 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Sensor data
s_13_12 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Memory data
s_13_13 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Other, please specify
s_4 What kind of information do you gather when investigating a cyber-security incident? Select one or more - Other, please specify
stato_1 Overall Status - New
stato_2 Overall Status - Distributed
stato_3 Overall Status - Partially Complete
stato_4 Overall Status - Complete
stato_5 Overall Status - Rejected
Løbenummer Ikke betydningsbærende unikt løbenummer skabt under aflevering til arkiv