Milijarda podatkov v podatkovni bazi SiStat

To the Top
You are currently atChoose variable

Number of enterprises with 10 or more employees and self-employed that experience problems due to ICT related security incidents in the previous year, by activity (NACE Rev. 2), Slovenia, multiannually

Choose variables

Statistical Office of the Republic of Slovenia, T: +386 1 241 64 04, E: gp.surs@gov.si
10/9/2024
number
Statistical Office of the Republic of Slovenia
Now you have come to the page, Choose variable. This page give you the oportunity to select which variables and values you want to display in your result of the table. A variable is a property of a statistical unit. The page is divided into several boxes, one for each variable, where you can select values by click to highlight one or more values. It always starts with the statistics variable which is the main value counted in the table.
Mandatory

Selected 0 of total 2

Mandatory
Field for searching for a specific value in the list box. This is examples of values you can search for.0 Number of enterprises , 1 Enterprises experience problems due to ICT related security incidents in the previous year , 1.1 Unavailability of ICT services due to hardware or software failures or attack from outside ,

Selected 0 of total 11

Mandatory
Field for searching for a specific value in the list box. This is examples of values you can search for.Activity – TOTAL , Manufacturing activities (activities C–F) , Service activities (activities G–S) ,

Selected 0 of total 21

Number of selected data cells are:
Maximum number allowed is 1,000,000.

Presentation on screen is limited to 1,000 rows and 50 columns

Number of selected cells exceeds the maximum allowed 1,000,000. To download all data from the table, click the "About table" button at the top of the page and export the entire file in Px format.

Notes

In some cases totals do not match because of rounding.

ICT RELATED SECURITY INCIDENT

1.1.2 Unavailability of ICT services due to attack from outside, e.g. ransomware attacks, Denial of Service attacks

Ransomware attack – Malicious software encrypts data on a computer or network. This prevents the user from using them. He regains access to them when he pays a certain amount (ransom). DoS attack – Denial of Service attack or an attack from the outside that prevents users the usage of information system.

1.3 Disclosure of confidential data due to intrusion, pharming, phishing attack, intentional actions by own employees or unintentional actions by own employees

Pharming attack – users are unknowingly redirected to malicious websites; even if they enter the correct address of the website, they want to visit in the browser's address bar. These are mostly complete copies of the originals, so users do not notice this and provide their personal information without hesitation. Phishing attack – an attempt to illegally obtain online information (e.g. online passwords, usernames, credit card information) by means of e-mail that directs the user to fake websites.

1.3.1 Disclosure of confidential data due to intrusion, pharming, phishing attack, intentional actions by own employees

Pharming attack – users are unknowingly redirected to malicious websites, even if they enter the correct address of the website; they want to visit in the browser's address bar. These are mostly complete copies of the originals, so users do not notice this and provide their personal information without hesitation. Phishing attack – an attempt to illegally obtain online information (e.g. online passwords, usernames, credit card information) by means of e-mail that directs the user to fake websites.
Linked content:
- Methodological explanations