Digitalisation and ICT in the public sector

To the Top
The 3 steps are Choose table, Choose variable and Show result. You are currently at Choose variables

10855: Implemented ICT security efforts (Central government) 2004 - 2021

Ekaterina Denisova, Statistics Norway
+47 40 90 24 12
2021-05-06 08:00
Subscription on virus protection software:
per cent
Firewall:
per cent
Spam-filters:
per cent
Keeping backup on other location than the operating area:
per cent
Routinely tests which verifies that back-up is not corrupt or manipulated:
per cent
Uneruptable power supply:
per cent
Intrusion detection software:
per cent
Anti phishing software:
per cent
Routinely penetration tests on internal systems:
per cent
Routines for installation of security patches on systems:
per cent
Emergency exercice not less than once a year:
per cent
Emergency solutions for communication (alternatives for data and telecommunications):
per cent
2-factor authentication for employees when external login to the enterprises' ICT systems:
per cent
Role based user system: one employee have only access to the area he/she works with (Least privilege principle):
per cent
Central log services:
per cent
Technical efforts for treatment of sensitive data (i.e. encryption, digital signature):
per cent
Encryption of the enterprise's portable ICT devices:
per cent
Subscription on virus protection software:
2nd quarter
Firewall:
2nd quarter
Spam-filters:
2nd quarter
Keeping backup on other location than the operating area:
2nd quarter
Routinely tests which verifies that back-up is not corrupt or manipulated:
2nd quarter
Uneruptable power supply:
2nd quarter
Intrusion detection software:
2nd quarter
Anti phishing software:
2nd quarter
Routinely penetration tests on internal systems:
2nd quarter
Routines for installation of security patches on systems:
2nd quarter
Emergency exercice not less than once a year:
2nd quarter
Emergency solutions for communication (alternatives for data and telecommunications):
2nd quarter
2-factor authentication for employees when external login to the enterprises' ICT systems:
2nd quarter
Role based user system: one employee have only access to the area he/she works with (Least privilege principle):
2nd quarter
Central log services:
2nd quarter
Technical efforts for treatment of sensitive data (i.e. encryption, digital signature):
2nd quarter
Encryption of the enterprise's portable ICT devices:
2nd quarter
Statistics Norway
External PROD
Now you have come to the page, Choose variable. This page give you the oportunity to select which variables and values you want to display in your result of the table. A variable is a property of a statistical unit. The page is divided into several boxes, one for each variable, where you can select values by click to highlight one or more values. It always starts with the statistics variable which is the main value counted in the table.
Navigating with keyboard and screenreader. Select multiple object in row: SHIFT+arrow down/up. To select a single value in the listbox: Windows:Hold Ctrl + arrow down. Then release Ctrl and press space. Repeat. Mac:CMD+arrow down/up. Then release CMD and press spacebar. Repeat. (Works only in Chrome, not in Safari). To exit listbox with values selected, press TAB-key.
Mandatory
Field for searching for a specific value in the list box. This is examples of values you can search for.Subscription on virus protection software , Firewall , Spam-filters ,

Selected 1 of total 17

Mandatory
Field for searching for a specific value in the list box. This is examples of values you can search for.2004 , 2005 , 2006 ,

Selected 1 of total 14

Selected 0 of total 2

Optional variable
Number of selected data cells are:
(maximum number allowed is 300 000)
Number of selected cells exceeds the maximum allowed 300 000