Professional Documents
Culture Documents
http://www.surveymonkey.com/MySurvey_Responses.aspx?sm=YKp8U...
anubhavnik
Sign Out
Help
Home
My Surveys
Resources
+ Create Survey
Design Survey
Collect Responses
Analyze Results
+ Add Report
Response Summary
PAGE: 1
Create Chart
82.2% 16.7%
1.1%
90 0
Phishing Email Attachment Trojans Botnets Drive-by-Downloads Social Network Dumpster Diving Pop-up windows Whishing Other (please specify)
Show Responses
7.8%
90 0
1 of 4
1/3/2012 1:59 AM
http://www.surveymonkey.com/MySurvey_Responses.aspx?sm=YKp8U...
Create Chart
Download
Response Percent I am fully aware of social engineering. I have heard about it from friends or media. I don't know what is it. Other (please specify)
Show Responses
Response Count 35 47 7
1.1%
90 0
4. What medium did the attacker use to perform social engineering based attacks on you?
Create Chart
Download
Response Percent Email Service Social Networking Sites IRC Chat Mobile Phone Advertisements posted on websites Other (please specify)
Show Responses
Response Count 68 65 13 20 48
10.0%
90 0
5. Do you think a lot of technology products have flaws in their security design which are used by an attacker to perform technology-based scams?
Create Chart
Download
Response Percent Yes No Other (please specify) 78.9% 21.1% 0.0% answered question skipped question
Response Count 71 19 0 90 0
6. Do you think a lot of technology products have flaws in their security design which are used by an attacker to perform technology-based scams?
Create Chart
Download
Response
Response
2 of 4
1/3/2012 1:59 AM
http://www.surveymonkey.com/MySurvey_Responses.aspx?sm=YKp8U...
6. Do you think a lot of technology products have flaws in their security design which are used by an attacker to perform technology-based scams?
Create Chart
Download
Count 70 18
77.8% 20.0%
2.2%
90 0
Create Chart Download 7. Do you think that most security technologies are incapable of detecting and preventing social engineering based attacks as social engineering bypasses technical control via manipulating people who are managing them? Response Percent Yes No Other (please specify) 64.4% 35.6% 0.0% answered question skipped question Response Count 58 32 0 90 0
8. What are the advancing technology products used by attackers as information gathering tools?
Create Chart
Download
Response Percent Google Applications Facebook Twitter Linkedin Discussion Forums Blog Sites Other (please specify)
Show Responses
Response Count 65 71 26 29 54 34
6.7%
90 0
Create Chart 9. Do you think that people in INDIA generally have a higher level of social trust which implies that they are more vulnerable to social engineering based attacks? Response
Download
Response
3 of 4
1/3/2012 1:59 AM
http://www.surveymonkey.com/MySurvey_Responses.aspx?sm=YKp8U...
Create Chart 9. Do you think that people in INDIA generally have a higher level of social trust which implies that they are more vulnerable to social engineering based attacks? Percent Yes No 90.0% 10.0% answered question skipped question
Download
Count 81 9 90 0
Create Chart 10. Do you think in INDIA the organizations have a well-defined security strategy and awareness program for their employees for social engineering based attacks? Response Percent Yes No 10.0% 90.0% answered question skipped question
Download
Response Count 9 81 90 0
Follow Us: Facebook Twitter LinkedIn Our Blog Help: Tutorials Answers & FAQs Contact Support About Us: Management Team Board of Directors Partners Newsroom Contact Us We're Hiring Policies: Terms of Use Privacy Policy Anti-Spam Policy Security Statement Email Opt-Out
Dansk Deutsch English Espaol Franais Italiano Nederlands Norsk Portugus Suomi Svenska ()
Use Cases Customer Feedback Product Feedback Market Research Employee Satisfaction Performance Reviews Healthcare Surveys Event Planning Education Surveys Non Profit Surveys Phone Polling Forms By Wufoo SurveyMonkey Audience
4 of 4
1/3/2012 1:59 AM