12618: Implemented ICT security efforts (County municipalities, municipalities) 2019
Mark your selections and choose between table on screen and file format. Marking tips

For variables marked Select at least one value you need to select at least one value

contents Select at least one value

Total 13 Selected

Search

effort status

Total 2 Selected

Search

forvaltningsnivå Select at least one value

Total 2 Selected

Search

number of inhabitants

Total 8 Selected

Search

year Select at least one value

Total 1 Selected

Search


Number of selected data cells are:(maximum number allowed is 300 000)

Presentation on screen is limited to 1 000 rows and 30 columns


Number of selected cells exceeds the maximum allowed 300 000
Contact and information

Information

Latest update
2019-04-29
Contact
Øystein Åmelfot Dyngen, Statistics Norway
+47 409 02 357
dyn@ssb.no

Unit
Keeping backup on other location than the operating area:
per cent
Routinely tests which verifies that back-up is not corrupt or manipulated:
per cent
Uneruptable power supply:
per cent
Intrusion detection software:
per cent
Anti phishing software:
per cent
Routinely penetration tests on internal systems:
per cent
Routines for installation of security patches on systems:
per cent
Emergency solutions for communication (alternatives for data and telecommunications):
per cent
2-factor authentication for employees when external login to the enterprises' ICT systems:
per cent
Role based user system: one employee have only access to the area he/she works with (Least privilege principle):
per cent
Central log services:
per cent
Technical efforts for treatment of sensitive data (i.e. encryption, digital signature):
per cent
Encryption of the enterprise's portable ICT devices:
per cent
Reference time
Keeping backup on other location than the operating area:
2nd quarter
Routinely tests which verifies that back-up is not corrupt or manipulated:
2nd quarter
Uneruptable power supply:
2nd quarter
Intrusion detection software:
2nd quarter
Anti phishing software:
2nd quarter
Routinely penetration tests on internal systems:
2nd quarter
Routines for installation of security patches on systems:
2nd quarter
Emergency solutions for communication (alternatives for data and telecommunications):
2nd quarter
2-factor authentication for employees when external login to the enterprises' ICT systems:
2nd quarter
Role based user system: one employee have only access to the area he/she works with (Least privilege principle):
2nd quarter
Central log services:
2nd quarter
Technical efforts for treatment of sensitive data (i.e. encryption, digital signature):
2nd quarter
Encryption of the enterprise's portable ICT devices:
2nd quarter
Source
Statistics Norway
Database
External PROD
Footnotes

Footnotes

There are no footnotes

User manual for StatBank