CYBER SECURITY AWARENESS (CSA) SURVEY
Dear Respondent

ACETEL, NOUN is conducting a survey on Cyber Security Awareness and your input will contribute towards providing a safer learning space in NOUN. This survey is strictly for the purpose of research and your responses remain confidential.

Thank you

ACETEL Research Team
NOUN

Sign in to Google to save your progress. Learn more
What is your gender? *
Please select the age group you belong to: *
Please indicate your current level/academic programme: *
Please indicate the frequency with which you surf the Internet: *
Please indicate the main activity you carry out while surfing the Internet: *
If you do not surf the Internet, please indicate your main reason for not surfing the Internet: *
In which case(s) would you open a file attached to an e-mail you receive? *
Required
To which of the following people would you reveal your password if requested to do so? *
Which of the following password would you feel safe to choose as your password? *
Are you aware of any cyber security policy upheld in NOUN? *
Do you know of anyone or any unit in NOUN that you can contact if your system is hacked? *
Please indicate your level of agreement with the following statements by clicking on the           corresponding box: *
Strongly Disagree
Disagree
Neutral
Agree
Strongly Agree
It is okay to save my password on a website I frequently visit
Logging into my official email account in a cyber café or any other public place is acceptable
It is harmless to download software, music, video or programs for free without permission
It is important to install and enable firewall on my device
I have very little to lose if a hacker invades my computer
Establishing a Cyber Security culture amongst Staff in NOUN is not so important.
Is anti-virus currently installed, updated and enabled on your device? *
Which of the following is an insidious software that is designed to cause damage on a stand-alone or networked device? *
Which of the following forms of cyber attack occurs when an intruder gains access to someone’s private information and uses it to gain access to that person’s resources? *
Which of the following is the act of sending bogus  e-mails in order to lure users  to websites that resemble the legitimate website
Clear selection
How often should I change a password?
You're browsing on a random site and a pop-up advertisement comes up. What's the most secure action?
Thank you for participating in our survey
Submit
Clear form
Never submit passwords through Google Forms.
This form was created inside of National Open University of Nigeria. Report Abuse