2014 Survey on Information Security (Individual)

Transcription

2014 Survey on Information Security (Individual)
2014 Survey on Information Security
(Individual)
Executive Summary
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
Contents
I. Introduction ·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·1
II. Awareness of Information Security ·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·2
1. Awareness of the Importance of Information Security ·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·2
2. Awareness of Threats to Information Security ·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·3
3. Gathering & Learning of Information Related to Information
Security ·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·4
4. Usage of Information Security Learning & Product/Services ·
·
·
·
·
·
·
·
·
·
·
·
·7
III. Prevention of & Response to Security Incidents ·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·8
1. Status of Security Incident Prevention ·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·8
2. Security Incident Experience & Response ·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·11
Ⅳ. Personal Information Protection & Spam Countermeasures ·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·13
1. Awareness of Personal Information Protection and Prevention of
Breach ·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·13
2. Experience of & Response to Personal Information Breach ·
·
·
·
·
·
·
·
·
·
·15
3. Awareness & Usage Experience of a Means of Identification ·
·
·
·
·
·
·
·17
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·18
4. Response to Receiving Spam ·
·
·
·
·
·
·
·
Ⅴ. New Service Information Security ·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·19
1. Awareness of New Service Information Security ·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·19
2. Confirmation of Smart Device Usage and Preventive/Protective
Measure for Security Incidents ·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·
·20
The report is produced by the Korea Internet & Security Agency. When citing the statistic data in this
report, the quotation must identify KISA as its source. The report can also be found on the homepage
of the Korea Internet & Security Agency(http://isis.kisa.or.kr)
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
I. Introduction
Population
Sample Size
Internet user who has been used Internet
for the recent one month(aged 12-59)
2,500 Internet users
Data
Collection
Face to face interview
Fieldwork
Period
2014. 7. 1 ~ 8. 31
Sampling
Method
Multi-stage Stratified Sampling
Sampling
Error
Information Security software usage ±1.92%p
(95% confidence level)
Sampling design
• Primary sampling frame : 2010 Census & 2013 Demographic Projection
(The Statistics Korea)
• Secondary sampling frame : 2013 Survey on Internet Usage
Glossary
• Malicious code : A hazardous code(Virus or Trojan-horse) which infects other
programs in a computer through an attached file in an email, file sharing site,
or visiting a web site which destroys normal programs or other data files.
• Wireless LAN : Wireless internet service which can be used within a certain
distance(Hot zone) from the installed location of AP(Access point).
• Biometric Information : A means of identification by using physical/ behavioral
characteristics such as fingerprint, iris, face or veins.
1
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
II. Awareness of Information Security
1. Awareness of the importance of information security
Most internet users considered information security important
93.9% of Internet users recognized that information security was important when using the
Internet.
Females(94.5%) recognized the importance of information security more than males(93.2%), and
the awareness rate of the importance of information security was shown to peak in the 30s
(97.0%), 20s(96.1%), and 40s(95.8%).
[ Figure 1. Awareness of the importance of information security(%) ]
2
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
2. Awareness of threats to information security
Direct threats of damages such as 'personal information breach' & 'financial
damages' were considered ‘serious’
It was shown that there is a high level of recognition & concerns regarding 'personal information
exposure/privacy invasion' & 'financial loss through electronic financial fraud'.
'Financial loss through credit card/debit card fraud’(85.6%) has been investigated to have caused
the most damages.
The concern over the seriousness of damages from 'information loss & performance decline in
devices due to Worm/Virus infection' or 'ad-ware/spy-ware' were relatively low.
[ Figure 2. Awareness of threats to information security(multiple response, %) ]
3
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
3. Gathering & learning of Information related to information
security
A. Interest information type related to information security
‘Information regarding concrete examples of damage prevention &
countermeasures' is the most desired information
62.5% of Internet users showed interest in information related to information security,
The highest interest was shown in a ‘Concrete example of a damage prevention &
countermeasure(34.1%)', 'latest security status & damage information related to security(32.0%)',
and 'related information regarding information security products & services(30.8%)' in order.
[ Figure 3. Interest information type related to information security(multiple response, %) ]
4
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
B. Gathering information related to information security
Information related to information security was mostly acquired through 'TV,
Newspaper, Internet' & 'acquaintances’
62.0% of Internet users were shown to conduct gathering information activities in relation to
information security.
The ratio of ‘Acquire an article related to information security(48.1%)' & 'Obtain related
information from surroundings(45.4%)' were relatively high in comparison with other activities.
[ Figure 4. Information gathering activities(multiple response, %) ]
5
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
C. Obstacles to information gathering & learning related to
information security
The major obstacles to the gathering of information & learning were a ‘Large
amount of information & complexity' and 'difficulties in the terminology'
'The amount of information & complexity(34.7%)' & 'difficulties in the terminology(31.6%)' were
recognized as major difficulties with gathering information & learning related to information
security.
[ Figure 5. Obstacles on gathering information & learning(multiple response, %) ]
6
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
4. Usage of information security learning & product/services
8 out of 10 Internet users have used learning & product/services in relation to
information security
83.8% of Internet users have experience using learning product/services in relation to information
security.
The usage experience of 'products related to information security(75.3%)' such as authentication
certificates, safe payment, and one-time passwords was shown to be the highest.
[ Figure 6. Usage experience of
[ Figure 7. Usage type of learning &
learning & product/service(%) ]
product/service(multiple response, %) ]
7
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
III. Prevention of & Responses to Security Incidents
1. Status of security incident prevention
A. Utilization function of information security software
The real-time malicious code monitoring function was used the most
By information security software users, ‘real-time malicious code monitoring(54.9%)' & 'scheduled
virus inspection(49.8%)' functions were mainly used, and 'real-time mail protection(29.8%)' &
'real-time network protection(25.7%) were used to a lesser extent.
[ Figure 10. Utilized function of information security software(multiple response, %) ]
- Information security software user
※ Information security software users refers to a user of information security products/services(Software) such as vaccine and
anti spy-ware.
8
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
B. Update method of Vaccine program
78.0% of information security software users have conducted an update for a
vaccine program
The information security software users have used 'Automatic update(49.6%)' the most as a
method of update.
The user ratio of manual vaccine program update was shown to be 28.4% and the user ratio
of no update was shown to be 2.0%.
[ Figure 11. Update method of Vaccine program(%) ] - Information security software user
9
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
C. Preventive measures for PC & Network security
78.3% of users have not 'accessed suspicious web sites' for PC & network security
It was investigated that internet users have mainly taken measures such as 'do not access
suspicious web sites(78.3%)' and 'do not open attached files of suspicious e-mails(67.4%)' for PC
and Network security.
Measures like 'operating system security patch update(31.5%)', 'data backup(22.9%)', and
'application software security update(22.7%) were shown to be relatively low.
[ Figure 12. Preventive measure for PC & Network security(multiple response, %) ]
D. Operating system security patch update
3 out of 4 users who conduct an operating system security patch update have
used the 'automatic update'
31.5% of Internet users have carried out an operating system security patch update and
preferred 'automatic updates(72.5%)' over 'manual updates(27.5%)'.
[ Figure 13. Execution of
[ Figure 14. Operating system security patch update method(%)]
security patch update(%)]
- Users who update
10
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
2. Security incident experience & response
A. Experience of Internet & personal information security incident
22.0% of internet users have experienced of an internet & personal information
security incident
It was shown that 22.0% of Internet users have experienced an internet and personal information
security incident.
Experienced damages were mostly caused by 'worm-virus infection(11.4%)' & 'personal information
exposure/privacy invasion(10.7%)'.
[ Figure 19. Experience of security
incident damages(%) ]
[ Figure 20. Experience of damages on each type of
security incident(multiple response, %) ]
11
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
B. Response to Internet & personal information security incident
More than half of users who experienced a security incident did not take any
particular action
52.6% of users who experienced a security incident ‘did not taken any particular action' when the
incident occurred.
Countermeasures such as 'the installation of security software(15.0%)', 'counsel/inquiry to information
security personal company(13.7%)', and 'counsel/inquiry to internet service provider(11.8%)' were
mainly taken.
[ Figure 21. Countermeasures against Internet & personal information security incidents(multiple response, %) ]
- Users who experienced a security incident
12
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
Ⅳ. Personal Information Protection & Spam Countermeasures
1. Awareness of personal information protection & prevention of
Breach
A. Awareness of importance of personal information protection
The majority of internet users recognized that personal information protection is
important
93.6% of Internet users recognized that personal information protection is important when using
the Internet.
With respect to age, those in their 30’s(96.9%) showed the highest rate of recognition of the
importance of personal information protection, followed by those in their 40s(96.4%) and
20s(93.6%).
[ Figure 22. The importance of personal information protection(%) ]
13
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
B. Preventive measures for personal information Breach
Basic measures for the prevention of personal information security incident have
been conducted the most
Internet
users
conducted
basic
measures
for
the
prevention
of
private
information
exposure/leakage the most, such as 'carefully managing private information, and not revealing it
to others(76.3%)'.
The rate of preventive measures such as 'taking care to use a shared folder(22.5%)', 'identity theft
confirmation service(21.0%)'. and 'storing authentication certificates on a USB(16.5%) were shown
to be relatively low.
[ Figure 24. Preventive measures for personal information breach(multiple response, %) ]
14
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
2. Experience & Responses to personal information Breach
A. Experience & type of personal information Breach
'Private businesses' were recognized as the primary violators of private information.
Users who experienced personal information breaches answered that private information was
mostly violated by 'private businesses'.
In particular, personal information was violated the most by 'the management negligence of
private businesses‘(66.5%), ‘providing private information to third parties by private businesses
(46.1%)’, and ‘unauthorized collection of personal information by private businesses‘(35.1%).
[ Figure 26. Experience and type of personal information breach(multiple response, %) ]
15
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
B. Response to personal information security incident
More than half of users who experienced a personal information security incident
did not take any particular action
More than half of users(62.3%) who have experienced a personal information security incident
were shown ‘not to have taken any particular action'.
When a countermeasure was taken, it was done mostly by 'withdrawing from the relevant
service and using a similar service from another company(29.5%).'
Relatively fewer experienced users were shown to have had ‘a direct complaint to the company
responsible
for
the
exposure/leakage
of
private
information
and
ask
for
financial
compensation’(6.9%), 'take an administrative measure of reporting/consulting the relevant
authorities’(5.1%), and 'suing for criminal & civil liability’(3.6%).
[ Figure 27. Countermeasures to personal information security incident(multiple response, %) ]
- Users who experienced personal information security incidents
16
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
3. Awareness & usage means of identification
Awareness & usage experience of 'mobile authentication(SMS)' & 'authentication
certificates' were high
The highest awareness(98.7%) & usage experience(90.1%) with 'mobile authentication(SMS)' as a
means of identification besides resident registration number was shown.
More than half of users recognized 'telephone/mobile authentication’(64.5%), 'credit card’(63.3%)
and 'i-PIN’(59.5%) but the ratio of usage experience among recognized users was shown to be
relatively low.
[ Figure 28. Awareness & usage experience of a means of identification besides resident
registration number(multiple response, %) ]
※ The usage experience represents a response rate on each standard item for internet users who recognized a means of identification
besides resident registration number.
17
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
4. Responses to receiving spam
A. Preventive measures against email spam
39.4% of internet users have tried to prevent email spam
Users who have taken necessary measures to prevent email spam were shown to be 39.4%.
'Sending a refusal of receipt to the sender’(21.6%) and 'using a spam mail filter service’(17.7%)
were most commonly used.
[ Figure 29. Preventive measure of email spam(multiple response, %) ]
B. Preventive measures against mobile spam
51.2% of Internet users have taken active measures to prevent mobile spam
More than half(51.2%) of users have taken measures to prevent mobile spam.
'The spam mail filter service’(31.6%) was used the most.
[ Figure 30. Preventive measure of mobile spam(multiple response, %) ]
18
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
Ⅴ. New Service Information Security
1. Awareness of new service information security
'Smart device' & 'SNS' security incidents were most common sources of concern
The recognition of a 'smart device' & 'SNS' among new services(products) was shown to be
the highest, and the security damages from these were shown to cause the most concern as
well.
'Cloud services’(35.7%), 'big data service'(16.7%), and 'internet of things'(IoT, 14.1%) were shown
to be relatively low.
[ Figure 31. Awareness of new service information security(multiple response, %) ]
※ The level of concern refers to a level of concern when a security incident on each item occurs based on a user who has recognized the item of a
new service(product).
19
2014 Survey on Information Security(Individual)
Korea Internet & Security Agency
2. Preventive/protective measures against security incidents in
smart devices
'Not visiting untrustworthy sites' for the prevention of security incidents
Smart device users most commonly took the measures of 'not visiting a site which can't be
trusted(72.0%)'. 'not downloading suspicious application’(67.2%), and 'deleting suspicious messages
& mail(64.2%)' in order to prevent/protect against security incidents.
Measures such as 'the latest version update of an operating system & vaccine program', 'use of a
downloaded file after scanning'. 'installation & inspection of a vaccine program', 'not voluntarily
modifying(jail-breaking) the platform structure of a smart device', and 'installing information
security applications(Phone Keeper) for smart devices' were shown to be more infrequently used.
[ Figure 34. Confirmation of smart device usage and preventive/protective measures against security incidents.
(multiple response, %) ] - Smart device users
※ Preventive/protective measure refers to the response rate of each standard item of smart device users.
20