Milijarda podatkov v podatkovni bazi SiStat

To the Top
You are currently atChoose variable

Number of enterprises with 10 or more employees and self-employed that use ICT related measures or procedures in enterprises, by activity (NACE Rev. 2), Slovenia, multiannually

Choose variables

Statistical Office of the Republic of Slovenia, T: +386 1 241 64 04, E: gp.surs@gov.si
10/9/2024
number
Statistical Office of the Republic of Slovenia
Now you have come to the page, Choose variable. This page give you the oportunity to select which variables and values you want to display in your result of the table. A variable is a property of a statistical unit. The page is divided into several boxes, one for each variable, where you can select values by click to highlight one or more values. It always starts with the statistics variable which is the main value counted in the table.
Mandatory

Selected 0 of total 2

Mandatory
Field for searching for a specific value in the list box. This is examples of values you can search for.0 Number of enterprises , 1 Enterprises use one of the security measures or procedures , 1.1 Authentication via strong password, e.g. minimum length, use of numbers and special characters, changed periodically ,

Selected 0 of total 21

Mandatory
Field for searching for a specific value in the list box. This is examples of values you can search for.Activity – TOTAL , Manufacturing activities (activities C–F) , Service activities (activities G–S) ,

Selected 0 of total 21

Number of selected data cells are:
Maximum number allowed is 1,000,000.

Presentation on screen is limited to 1,000 rows and 50 columns

Number of selected cells exceeds the maximum allowed 1,000,000. To download all data from the table, click the "About table" button at the top of the page and export the entire file in Px format.

Notes

Vsote se zaradi zaokroževanja včasih ne ujemajo.

ICT SECURITY IN ENTERPRISE

1.8 ICT security monitoring system that allows to detect suspicious activity in the ICT systems and alerts the enterprise about it, e.g. intrusion/prevention systems

Use of advanced intrusion detection methods, such as: Intrusion Detection/Prevention Systems (IDS/IPS); next-generation firewalls (NGFW), advanced systems for preventing intrusions into systems (Next Generation Intrusion Prevention System – NGIPS). The use of stand-alone anti-virus software is not included.

6 ICT security related activities carried out in the enterprise by own employees or external suppliers

ICT security related activities, e.g. security testing, ICT training on security, resolving ICT security incidents.

6.1 ICT security related activities carried out in the enterprise by own employees (incl. those employed in parent or affiliate enterprises)

ICT security related activities, e.g. security testing, ICT training on security, resolving ICT security incidents.

6.2 ICT security related activities carried out in the enterprise by external suppliers

ICT security related activities, e.g. security testing, ICT training on security, resolving ICT security incidents.
Linked content:
- Methodological explanations