Great Circle Associates Firewalls
(June 1996)

Indexed By Date: [Previous] [Next] Indexed By Thread: [Previous] [Next]

Subject: Encryption
From: Bridget011 @ aol . com
Date: Sun, 23 Jun 1996 22:07:06 -0400
To: Firewalls @ greatcircle . com


      I am gathering data for a research paper in my master's degree program.
I am looking at cryptography's impact on an organization's IT.  This topic is
not specific to this list,  however your responses will be invaluable in this
project.  As part of
my research,  a survey of IT professionals on this topic is needed.  Your
assistance in completing this survey is greatly appreciated.

     All responses will be kept confidential.  Anonymous or partial
submissions are welcome.

     Please provide your response via email or fax to 703-696-8077.

      Thankyou very much for your time and support.

                                                  Melissa Hicks
                                                  American University


1. Do you use encryption products at your organization?

¨ Yes
¨ No

2. If no, do you plan to implement encryption in the next 6-months?

¨ Yes
¨ No

3. Classification of your business:

¨ Private Industry
¨ Federal/State Government
¨ Department of Defense

4. Which type of encryption products do you use?

¨ Voice Encryption
¨ Fax Encryption
¨ Data Encryption

5. Which encryption algorithms do you use?

¨ Other (Please specify) ____________

6. Do you plan to implement the U.S. Government's Fortezza encryption

¨ Yes
¨ No

7. Do you encrypt to secure the following:

¨ E-mail
¨ File transfers
¨ Electronic Data Interchange
¨ Financial transactions
¨ Stored data

8. Where are encryption products placed in your network?

¨ Host software based
¨ Host hardware based
¨ On a path to the network
¨ At the entry/exit point to the local network
¨ In the network

9. What are the major costs of implementing encryption?

¨ Operation
¨ Maintenance
¨ Training

10. Budget for encryption is:

¨ Less than $5000
¨ $5000-$10000
¨ $10000-$50000
¨ $50000 or greater
¨ Don't know

Please rate the following on a scale of 1 to 5.  
(1)=strongly disagree
(3)=agree somewhat
(5)=strongly agree

11. Are you satisfied with the encryption products you use?

12. Do you think the U.S. export controls on encryption products are too

13. Are the U.S. export controls on encryption hurting your business?

14. How do you agree with the following statements:

a. Company is trained to handle encryption products.

b. Have sufficient staff to implement encryption.

c. Have sufficient funding to implement encryption.

d. Endusers are supportive of the encryption program.

e. Endusers understand the need for encryption.

f. Upper management understands the need for encryption.

g. Encryption is needed to remain competitive.

h. Encryption is needed to gain a competitive advantage.

15. Please indicate on a scale of 1 to 5 (1=Not Important  to  5=Very
Important)  the extent  the following are critical success factors in the
implementation of encryption:

a. Funding

b. Technology

c. Technical skills

d. Management support

e. Enduser support

16. Please provide your position title and years of experience in this

Job/position title: ______________________________
Years of experience in this job/position: ___________

17.  If your company is not based in the United States, please indicate your

18.  Please provide any additional comments on this topic.


Indexed By Date Previous: Encryption
From: Bridget011 @ aol . com
Next: RE: Pilot Network Services
From: "Paul D. Robertson" <proberts @ clark . net>
Indexed By Thread Previous: Encryption
From: Bridget011 @ aol . com
Next: Re: Encryption
From: sameer @ wiproge . med . ge . com (Sameer )

Search Internet Search