Appendix 1: Questionnaire about enterprise information and network communication security
Hello!
We are a member of the Wisher Entrepreneurial Team of China University of Science and Technology, which is conducting an investigation on information and network communication security of the enterprise. With the advent of the information age, network technology is gradually popular, information and network communication security issues are increasingly displayed. The purpose of this survey is to understand what needs to be applied to this issue by understanding the importance of enterprises, the relevant technologies and equipment applied in the company, as well as what needs to have the need for this issue, thereby maintaining technical development or promotion work. Enterprise information and network communication security issues provide a certain help, enabling companies to develop healthily and quickly.
The selection of this survey is strictly extracted by the survey sampling method. I am honored to work with you. All questionnaire information only do statistical purposes, the answer does not have a difference, please choose or fill in (if there is no special instruction, each question is only one answer).
Thank you very much for your cooperation!
Wisher Entrepreneurial Team, Huazhong University of Science and Technology
2001/10/11
One. Company Profile
1. Enterprise nature:
(1) State-owned enterprises (2) Private enterprises (3) Sino-foreign joint venture (4) foreign-owned enterprises
(5) Sino-foreign cooperative enterprises (6) Other _____________________________
2. Enterprise established years:
(1) 5 years (2) 5-10 (3) 10-15 years (4) More than 15 years
3. Industry Scope (Main):
(1) Information Industry (2) Financial Industry (3) Industry (4) Service Industry (5) High-tech Industry
(5) Other _____________________________
4. Customer scope:
(1) Hubei (2) Zhongnan (3) All over the country has developed to overseas
two. The status quo and needs of corporate information and network communication security
1. Does your company have their own website?
(1) Yes (2) No
2. Does the important business use EMAIL to contact the customer?
(1) Yes (2) No
3. Does your company perform e-commerce?
(1) Yes (2) No
4. Are you worried about the network information security of your company?
(1) I am very worried (2) more worried (3) It doesn't matter (4), not worried, I don't worry (5) I have not considered it.
5. Does your company have specialized in information about information and network security?
(1) Yes (2) No (please jump to answer the 8 questions)
6. What department or personnel doing in your business? _____________________________
7. Does your company have considered the following situation and use related measures? (Please sort in the corresponding space-stricken) whether it is considered whether to take precautions, whether it has been prepared to adopt a host that does not intend to adopt an enterprise network is invaded.
Enterprise management sensitive information
Information is stolen when the internal data exchange is exchanged (especially those who have been stolen)
Electronic fraud, electronic theft
Encrypted data is incorrect in exchange and cannot be recovered
Whether the information exchange system guarantees the integrity of information exchange
Whether the information exchange system has certification, digital signature, non-recognition and other technical support
8. Why don't you use related technologies or devices for information and network communication?
(1) Enterprises require non-high requirements (2) I didn't expect to use safety technology.
(2) There is no suitable technology to adopt (4) the cost of investment is too high.
(5) Other ____________________________________
9. Is there a comprehensive technology to solve the unsafe factor in the information exchange process in the future?
(1) Hope (2) does not matter (3) undesirable
10. If you want to adopt, your business is planning?
(1) Business development of companies commissioned by our own R & D Technology (2)
(3) Purchase domestic prior art (4) Try new technologies
11. Do you trust the relevant technologies in China?
(1) Trust (2) General (3) Do not trust
12. What is the fact that your company is the first time to consider when using a new security technology?
(1) Powerful (2) Price moderate (3) Safe reliable (4) Easy to operate
(5) Other ________________________________
13. What is the function of this technology? (Multiple choice)
(1) Data exchange confidentiality, integrity (2) Public key authentication (3) Save network resources
(4) Undectability of Behavior (5) Digital Signature (6) Simplified Login
(7) Data encryption decryption (8) Object signature
(9) Other ____________________________________
14. Adopting a new comprehensive technology involves purchasing hardware and software, maintenance systems, training technicians, how many of your business can be accepted?
(1) below 1000 (2) 1000-3000 (3) 3001-10000 (4) 10,000 or more
Our questionnaire survey this end, thank you again for your cooperation!
I sincerely wish your business is prosperous! ! !