Security arrangements and secutiry policies of enterprises by activity class 2010

  • Dimensions

    • Total unit
      • Activity class
      • Activity class (of ent. with at least 10 employees)
    • Activity classes
      • Total
      • Accommodation and food service (5)
      • Construction (2)
      • Financial and insurance (7)
      • Information and communication (6)
      • Manufacturing and supply (1)
      • Specialised services (8)
      • Transportation and storage (4)
      • Wholesale and retail, repair (3)
    • Arrangments/policies
      • Log activities for analyses of security incidents
      • S. polocies for destruction or corruption of data due to an attack or by unexpected incident
      • S. polocies for disclosure of confidential data due to intrusion, pharming, phishing attacks or by accident
      • S. polocies for unavailability of ICT services due to attack from outside
      • Use offsite data backup
      • Use strong password authentication
      • Use user identification and authentication via biometric methods
      • Use user identification and authentication via hardware tokens