Milijarda podatkov v podatkovni bazi SiStat

To the Top
You are currently atChoose variable

Ramifications of ICT related security incidents encountered by financial enterprises in previous year, by enterprise size according to the number of persons employed, Slovenia, 2010

Choose variables

Statistical Office of the Republic of Slovenia, T: +386 1 241 64 04, E: gp.surs@gov.si
1/24/2022
Number of enterprises
Statistical Office of Republic Slovenia
Now you have come to the page, Choose variable. This page give you the oportunity to select which variables and values you want to display in your result of the table. A variable is a property of a statistical unit. The page is divided into several boxes, one for each variable, where you can select values by click to highlight one or more values. It always starts with the statistics variable which is the main value counted in the table.
Mandatory

Selected 1 of total 1

Selected 0 of total 6

Optional variable
Mandatory

Selected 0 of total 4

Number of selected data cells are:
Maximum number allowed is 1,000,000.

Presentation on screen is limited to 1,000 rows and 50 columns

Number of selected cells exceeds the maximum allowed 1,000,000. To download all data from the table, click the "About table" button at the top of the page and export the entire file in Px format.

Notes


RAMIFICATIONS OF SECURITY INCIDENTS

Unavailability of ICT services due to attack from outside, e.g. Denial of Service attack

DDoS - Denial of Service attack - an attack from outside that makes unavailable resources of the information system for the users. Server, network is saturated, burdened with so many requests that it can not process them. Because of the overload it can be temporary disabled.

Disclosure of confidential data due to intrusion, pharming, phishing attacks

Phishing - an attempt to obtain information like passwords, user name and e.g. data about credit cards with the help of an e-mail that directs the users to a fake website. Pharming - direct attack on the DNS server or file about the host that is stored on the user's computer. Users are without knowing redirected to fake websites although they write down in the browser the correct URL address they would like to visit. Because those fake websites are often perfect copies of the original, the users don't notice that they are on a fake website address and thus they enter their personal information.
Linked content:
- Methodological explanations