Milijarda podatkov v podatkovni bazi SiStat

Ramifications of ICT related security incidents encountered by enterprises in previous year, by enterprise size according to the number of persons employed, Slovenia, 2010, 2016
Mark your selections and choose between table on screen and file format. Marking tips

For variables marked Select at least one value you need to select at least one value

YEAR Select at least one value

Total: 2 | Selected:

Search

RAMIFICATIONS OF SECURITY INCIDENTS

Total: 6 | Selected:

Search

ENTERPRISE SIZE CLASSE Select at least one value

Total: 4 | Selected:

Search


Number of selected data cells are:(maximum number allowed is 1,000,000)

Presentation on screen is limited to 1,000 rows and 150 columns


Number of selected cells exceeds the maximum allowed 1,000,000
Contact and information

Information

Latest update
1/24/2022
Contact
Statistical Office of the Republic of Slovenia, T: +386 1 241 64 04, E: gp.surs@gov.si
Unit
Number of enterprises
Source
Statistical Office of the Republic of Slovenia
Footnotes

Footnotes


Linked content:
- Methodological explanations
RAMIFICATIONS OF SECURITY INCIDENTS
Unavailability of ICT services due to attack from outside, e.g. Denial of Service attack
DDoS - Denial of Service attack - an attack from outside that makes unavailable resources of the information system for the users. Server, network is saturated, burdened with so many requests that it can not process them. Because of the overload it can be temporary disabled.
Disclosure of confidential data due to intrusion, pharming, phishing attacks
Phishing - an attempt to obtain information like passwords, user name and e.g. data about credit cards with the help of an e-mail that directs the users to a fake website. Pharming - direct attack on the DNS server or file about the host that is stored on the user's computer. Users are without knowing redirected to fake websites although they write down in the browser the correct URL address they would like to visit. Because those fake websites are often perfect copies of the original, the users don't notice that they are on a fake website address and thus they enter their personal information.